Hacker Perspectives Advanced Computer Networks SS 2007 Franz Sommerauer ACN SS 07 - Hacker Perspectives Overview Definition of a Hacker History of Hacking How to get into Scene Information Gathering Ethical Hacking Most famous Hackers ACN SS 07 - Hacker Perspectives Definition (see Hacker Jargon file) 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. ACN SS 07 - Hacker Perspectives Types of hackers White hat – – Grey hat – – A person who is ethically opposed to the abuse of computer systems (ethical hacker) Generally focuses on securing IT systems A skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not Hybrid between white and black hat hackers Black hat – – Someone who compromises the security of a system without permission from an authorized party Cracker ACN SS 07 - Hacker Perspectives History of hacking 1972 – John Draper discovers that a 2.6 kHz tone allows to access the internal trunking mechanism of Ma Bell 2.6 kHz tone created by a whistle With a Blue box it was possible to take internal control of Ma Bell's long distance switching equipment 1973 – College students Steve Wozniak and Steve Jobs begin making and selling blue boxes ACN SS 07 - Hacker Perspectives History of hacking 1981 – 1982 – Chaos computer Club forms in Germany Hacker group of six teenage hackers (414’s) broke into 60 computer systems and instiutitions (including Los Alamos Labs) 1988 – Kevin Mitnick secretly monitors the e-Mail of security officials (sentenced for one year to jail) ACN SS 07 - Hacker Perspectives History of hacking 1988 – Robert T. Morris launches a worm on governments ARPAnet (precursor of the Internet) – The worm spreads to 6000 networked computers First person indicted under the Computer Fraud and Abuse Act of 1986 3 years probation 400 hours community service Fine of $10,050 and cost of his supervision First National Bank of Chicago became victim of $70-million computer theft ACN SS 07 - Hacker Perspectives History of hacking 1989 – Hackers in West Germany were arrested – Broke into U.S. Government and corporate computers Sold OS-Sourcecode to Soviet KGB Fry Guy was arrested earned the name by hacking into a local McDonald's computer and giving raises to his hamburger-flipping friends Got credit card numbers by social engeneering ACN SS 07 - Hacker Perspectives History of hacking 1993 – During radio station call-in contests, Kevin Poulsen and 2 friends rigged the stations phone systm to let their calls through – Won 2 Porsches, vacation trips and $20.000 Texas A&M Univerity professor received death threats because a hacker used his email account to sent 20.000 racist emails ACN SS 07 - Hacker Perspectives History of hacking 1994 – Vladimir Levin and his group transferred $10 million from Citibank to bank accounts all over the world Sentenced to three years in prison 1995 – Kevin Mitnick arrested again FBI accused him of stealing 20.000 credit card numbers stealing files from companies as Motorola and Sun Microsystems ACN SS 07 - Hacker Perspectives History of hacking 1998 – 1999 – 2 hacker were sentenced to death in China for stealing 260.000 Yuan ($31.400) Unidentified hacker seized control of British military communication satellite and demanded money in return for control of satellite 2000 – Hackers broke into Microsoft‘s corporate network – Russian cracker attempts to extort $100.000 from online music retailer CD Universe – accessed source code for latest versions of Mircrosoft Windows and Office software threatening to expose thousands of customers credit card numbers I love you virus spread rapidly around the world infected image and sound files ACN SS 07 - Hacker Perspectives History of hacking 2002 – Mircrosoft sent more than 8.000 programmers to security training 2004 – Myron Tereshchuk was arrested Attempting to extort $17 million from Micropatent 2006 – Jeanson James Ancheta received a 57 month prison sentence ACN SS 07 - Hacker Perspectives How to get into scene How to become a hacker – – Learn about the techniques behind (program, UNIX, WWW) Contribute to a hacker culture – You aren't really a hacker until other hackers consistently call you one Hackers publish their work under real-names, Crackers use pseudonyms Experiment and try out things How to become a cracker – – – – Download a script and run it somewhere Download a file called “40HEX” Use your hacking skills for bad purpose The final reason a cracker cracks is for money ACN SS 07 - Hacker Perspectives Information gathering The more you know the easier you can attack. There are many ways to gather information – Footprinting, Ping Sweep, Port Scan, OS Detection, Finger Giving away knowledge is more dangerous than running insecure software. – – – Manuals must be secret! Never give away secret information over telephone! Try to conceal what software / hardware / versions you are using ACN SS 07 - Hacker Perspectives Information gathering Footprinting – Learn as much as you can about a system Remote access possibilities, ports, services … How does the phone-system work? How does the back-bone work? How does the company deal with the system? Who is responsible, who knows the system? Read papers, manuals and ask the ones who know ACN SS 07 - Hacker Perspectives Information gathering Social Engineering – – Attacker tries to convince someone to give out information, passwords Most innocent questions – What is the phone number/IP address for… Who is responsible for administrating the computer network Network structure The technical know-how is less important than information! ACN SS 07 - Hacker Perspectives Information gathering Ping sweep Ping a range of IP addresses to find out which machines are currently running Port Scan – TCP Scan: Scan ports to see which services are running – UDP Scan: Send garbage packets to ports ACN SS 07 - Hacker Perspectives Information gathering OS Detection This involves sending illegal ICMP or TCP packets to a machine Finger – – Retrieving the User List to get all accounts. Read Log-Files that show from where and when users are logging in. ACN SS 07 - Hacker Perspectives Ethical Hacking Best protect a system by probing it while causing no damage and fixing vulnerabilities found Simulate how an attacker with no inside knowledge of a system might try to penetrate Includes permission to intrude – – – Consulting services Hacking contests Beta testing ACN SS 07 - Hacker Perspectives Ethical Hacking The Problem – – – – Current software engineering practices do not produce systems that are immune from attack Current security tools only address parts of the problem and not the system as a whole → lack understanding leads to reliance upon partial solutions Policy and law in cyberspace is immature and lags the state-of-the-art in attacks System administration is difficult and becoming unmanageable due to patching against increased vulnerabilities ACN SS 07 - Hacker Perspectives Ethical Hacking The result – – Average time for a PC to be broken into directly out-of-box from the store and attached to the Internet is less than 24 hours. The worst case scenario is about 15 minutes ACN SS 07 - Hacker Perspectives Ethical Hacking Scanning Tools – Typical information that can be learnd from a port scan is: Existence of computer OS Version of OS Types of available services (smtp, httpd, ftp, telnet…) Type of computing platform ACN SS 07 - Hacker Perspectives Ethical Hacking Dual nature of a port scanner – – Most powerful tool an ethical hacker can use in protecting a network of computers Most powerful tool a cracker can use to generate attacks Historically most popular cracker attacks are those that use scanning tools to target known vulnerabilities ACN SS 07 - Hacker Perspectives Ethical Hacking Conflicts of interest – – – Security firms hype and invent threats Persons who work at security firms have been known to spend their off-hours creating and distributing the very attack tools their company sells to protect against Due to market pressure, businesses have used ethical hackers to: Beta test products Hacking contests ACN SS 07 - Hacker Perspectives Ethical Hacking Conclusion – – The present poor security on the Internet, ethical hacking may be the most effective way to proactively plug security holes an prevent intrusions. On the other hand, ethical hacking tools have also been notorious tools for crackers. ACN SS 07 - Hacker Perspectives Most famous Hackers Black hat hackers – Jonathan James – installed a backdoor into a Defense Threat Reduction Agency server cracked into NASA computers stealing software worth approximately $1.7 million started a computer security company Adrian Lamo His hits include Yahoo!, Bank of America, Citigroup and Cingular Now he is working as journalist and public speaker ACN SS 07 - Hacker Perspectives Most famous Hackers – Kevin Mitnick – Kevin Poulsen – He hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system is now a computer security consultant, author and speaker His hacking specialty, however, revolved around telephones He is now a senior editor for Wired News Robert Tappan Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory ACN SS 07 - Hacker Perspectives Most famous Hackers White hat hackers – Stephan Wozniak – Co-founded Apple computers with Steve Jobs got his start in hacking making blue boxes Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger Tim Berners-Lee famed as the inventor of the World Wide Web While working with CERN he created a hypertext prototype system that helped researchers share and update information easily founded the World Wide Web Consortium at MIT (W3C) ACN SS 07 - Hacker Perspectives Most famous Hackers – Linus Torvalds – Richard Stallman – Father of Linux He started with a task switcher in Intel 80386 assembly and a terminal driver. Then he put out a call for others to contribute code, which they did. Only about 2% of the Linux kernel is written by Torvalds himself (most prominent examples of free/open source software) Founded the GNU Project to develop a free OS Tsutomu Shimomura he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him Using Mitnick's cell phone, they tracked him near RaleighDurham International Airport ACN SS 07 - Hacker Perspectives Thank you for your attention! ACN SS 07 - Hacker Perspectives