Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Dot-Mil Hacker's Download Mistake
Wired ^ | Nov. 15, 2002 | Brian McWilliams

Posted on 11/15/2002 5:56:50 AM PST by stainlessbanner

Edited on 06/29/2004 7:09:31 PM PDT by Jim Robinson. [history]

Gary McKinnon, the Briton indicted this week for hacking into scores of U.S. military computers, left behind few clues on the compromised systems of his victims. But download log files from a Wisconsin software firm may have led investigators straight to his London door.


(Excerpt) Read more at wired.com ...


TOPICS: Crime/Corruption; Culture/Society; Front Page News
KEYWORDS: hacker; mil

1 posted on 11/15/2002 5:56:50 AM PST by stainlessbanner
[ Post Reply | Private Reply | View Replies]

To: rdb3
ping!
2 posted on 11/15/2002 5:57:30 AM PST by stainlessbanner
[ Post Reply | Private Reply | To 1 | View Replies]

To: stainlessbanner
Hacked from across the big pond. I wish the writer of the piece had included more info, like what he was using (although I have my own ideas on that).

Do you know what the military systems are running?

No mercy.
Coming soon: Tha SYNDICATE.
101 things that the Mozilla browser can do that Internet Explorer cannot.

3 posted on 11/15/2002 6:02:47 AM PST by rdb3
[ Post Reply | Private Reply | To 2 | View Replies]

To: rdb3; Bush2000
Looks like it's for Windoze:

A powerful remote access solution for Windows XP/2000/NT and Windows 98/ME http://www.remotelyanywhere.com/.

Obligatory bump to linux-hater Bush2000.

4 posted on 11/15/2002 6:08:00 AM PST by coloradan
[ Post Reply | Private Reply | To 3 | View Replies]

To: stainlessbanner
Szopinski said McKinnon likely obtained a "crack" or illegal license key to unlock copies of RemotelyAnywhere and place them on numerous computers.

Note to self: make sure that software used to break into other machines is properly licensed and paid for.

5 posted on 11/15/2002 6:22:13 AM PST by general_re
[ Post Reply | Private Reply | To 1 | View Replies]

To: coloradan
A powerful remote access solution for Windows

It sure was for this hacker!

6 posted on 11/15/2002 6:23:34 AM PST by stainlessbanner
[ Post Reply | Private Reply | To 4 | View Replies]

From Slashdot newsgroups:
"...the reason this guy didn't get into any classified information is because the military doesn't store classified information on the NIPRNet, that is, Unclassified but sensitive Internet Protocol Router Network. This NIPRNet is the Internet that DARPA originally developed and that everyone here uses today. Classified information is transmitted only along a SIPRNet, or Secret Internet Protocol Router Network, which is not actually connected to the public Internet.

Releasing or altering classified information would almost certainly require physical access to one of the computers that's already linked to the military SIPRNet. If the rest of the computers across the military are protected in similar fashion to the ones where I work--behind a foot-thick wall of steel with armed guards stationed at the entrances--I feel pretty good about the security of our classified information networks."


7 posted on 11/15/2002 6:27:16 AM PST by stainlessbanner
[ Post Reply | Private Reply | To 6 | View Replies]

To: rdb3
Sounds like the sys admins at the target site left some screen doors open. I'm a recovering computer luddite, and even I know that there are programs that can monitor installed programs and control their network activity. I run ZoneAlarm on my Win 98 machine at home. I know it just improves my illusion of security, but it did alert my to the fact that my ISP was regularly sending me PCAnywhere pings. It also tells me that it controls network access of installed programs although I don't fully believe that. The fact that I am aware of these things tells me that security was pretty lax at the targets.

As an aside, I wish I had skipped reading most of what what I've read about Linux. After weenying around for about a year, I finally bought Redhat Linux. What a snap it's been to install and use.

8 posted on 11/15/2002 6:31:15 AM PST by Jack of all Trades
[ Post Reply | Private Reply | To 3 | View Replies]

To: Jack of all Trades
Sounds like the sys admins at the target site left some screen doors open.

It was probably an unpatched version of IIS. Remember the CodeRed worm? All you would have to do is look at your own webserver log to get a list of servers that had been compromised. After that, it would have been a trival exercise.

Or you, could have modified a copy of the worm to target a specific IP address range. Your probes would have been lost among all the other unwitting participants.

I run ZoneAlarm on my Win 98 machine at home. I know it just improves my illusion of security, but it did alert my to the fact that my ISP was regularly sending me PCAnywhere pings.

Are you using dialup or cablemodem/DSL? If it is the latter, invest about $80 in a dedicated firewall/router from someone like Linksys. I have Win2K, WinXP and Linux systems, but all of them are behind a firewall.

9 posted on 11/15/2002 7:50:58 AM PST by justlurking
[ Post Reply | Private Reply | To 8 | View Replies]

To: justlurking
Thanks for the suggestions. That's just what I did. It was Worldcom that was pinging me. It was quite frustrating to get them to stop. I've since switched to cable. My trusty Linksys router sits between me and the outside world. Reviewing the access logs has helped me keep track of things since the switch.
10 posted on 11/15/2002 8:06:11 AM PST by Jack of all Trades
[ Post Reply | Private Reply | To 9 | View Replies]

To: stainlessbanner
correct.
11 posted on 11/15/2002 9:23:29 AM PST by sauropod
[ Post Reply | Private Reply | To 7 | View Replies]

To: Jack of all Trades
It was Worldcom that was pinging me. It was quite frustrating to get them to stop.

Was it actually a WorldCom server? If so, it could have been one of two things: One of their own systems had PC Anywhere and was misconfigured. Or, they had actually written something to search for unsecured PC Anywhere ports so they could warn/notify their subscribers.

The other possibility was that it wasn't Worldcom at all: it was just another subscriber. Unless they have their DNS servers configured so that reverse lookup tells you something useful, it's hard to tell.

12 posted on 11/15/2002 9:27:57 AM PST by justlurking
[ Post Reply | Private Reply | To 10 | View Replies]

To: justlurking
They told me they had one or more computers at an office near me running PCanywhere, and that they were misconfigured.
13 posted on 11/15/2002 9:33:42 AM PST by Jack of all Trades
[ Post Reply | Private Reply | To 12 | View Replies]

To: Jack of all Trades
They told me they had one or more computers at an office near me running PCanywhere, and that they were misconfigured.

Wow, that means they probably also had a security hole the size of a Mack truck. If I remember right, the default configuration of PC Anywhere was either completely open or any security was easily cracked.

14 posted on 11/15/2002 10:30:13 AM PST by justlurking
[ Post Reply | Private Reply | To 13 | View Replies]

Comment #15 Removed by Moderator

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson