Posted on 11/14/2002 10:48:04 AM PST by Leroy S. Mort
The download site for two very common Linux based utilities, tcpdump.org, was hacked into on Nov. 11, and the software available for download was modified to contain Trojan Horse code.
This Trojan Horse, or "back door" software allows the hacker that wrote it to access any machine on which the modified software is run.
The two software items affected are tcpdump and libpcap, tools commonly used in information security applications. Some Intrusion Detection System (IDS) software requires libpcap.
The identity of the hacker conducting this campaign is unknown, as is whether a connection exists between the separate incidents.
CERT releasedan advisory in which they ".encourage sites using libpcap and tcpdump to verify the authenticity of their distribution, regardless of where it was obtained."
CERT provided the information necessary to determine the authenticity of any libpcap or tcpdump software recently downloaded. The advisory also encourages users to verify all software before installing it. "As a matter of good security practice, the CERT/CC encourages users to verify, whenever possible, the integrity of downloaded software."
One of many strategies hackers use to root boxes. (linux or otherwise)
The advisory also encourages users to verify all software before installing it. "As a matter of good security practice, the CERT/CC encourages users to verify, whenever possible, the integrity of downloaded software."
md5sum your downloads. Don't blindly open attachments. "Be nice to your baby sister. Oh, yeah, never drive on the railroad tracks."
All Operating Systems suck, each in their respective way.
Sooner or later, that's not going to be good enough. Yes, it worked out this time and with the OpenSSH thing last time. But remember that the sums can be changed too.... we need to start signing the sums with trusted keys.
B-b-b-b-b-but .... that's impossible!!!! Only Microsoft can get hacked. Open-source stuff is inherently secure! All the MS-haters are clear on the point!
The lesson is, of course, that no operating system is safe from a determined person who wants to hack it. If anything, open source provides the hackers a leg up, because they can see exactly what they're trying to hack.
The primary problem to open source is inhouse attacks. Inhouse stealing accounts for more loss than shop lifters today. In the future in house attacks will be the most common form of attack. It is a lot easier with open source code.
Any good programmer can get the source code to Linux or BSD Unux. They can make changes, recompile and install the corrupted code. As far as CRC check sums are concerned, one just makes a corrupt module then play with unused bytes in the module to make both the size in bytes and the MD5 check some the same in both the valid and corruput module.
A person with access to a bank could change the modules so they don't do anything for months after he has left the compaany. Then the code steals the money and immediately erases itsself and all traces of the crime. The real danger is not the guy trying to hack from the net, it is the janitor that cleans the server room.
MAC viruses exist, but MAC is the the Switzerland of Operating Systems - an insignificant entity, and not much to be gained by invasion
I have better things to do with my time. This is nothing new.
No mercy.
Coming soon: Tha SYNDICATE.
101 things that the Mozilla browser can do that Internet Explorer cannot.
Any server physically accessible to an attacker is insecure. It doesn't matter what operating system it runs, or whether the source code for that OS is open or closed.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.