home *** CD-ROM | disk | FTP | other *** search
-
- <(cDc)> TWGSC: <209>/526-3194 <(cDc)>
-
- ------------------------------
- BLINDMAN'S BLUFF, HACKER STYLE
- ------------------------------
- From, Out of the Inner Circle, by Bill Landreth.
-
- THE SCENE: The control room in the computer center of one of the largest
- corporations in the world - an automobile manufacture wi'll call MegaCar
- International. THE TIME: 12:30 a.m. - the beggining of the graveyard shift.
-
-
- Al, a system operator, has just arrived for work. He signs in with the
- armed guard at the security console located between the main entrance to the
- building and the hallway that leads to the computer center. Halfway down the
- hall, he shows his ID badge to another guard, then passes in front of twin
- television cameras at the entrance to the computer center. Before entering
- the control room, he goes through another, identical, set of security
- procedures.
-
- There are good reasons for the tight security that surronds Al's
- workstation: He controls access to the computers that hold information worth
- billions of dollars to MegaCar International - and to MegaCar's competitors.
- Every night, the mainframes, minicomputers, and workstations of MegaCar's
- worldwide computer network process scores of secret details on next year's
- automobile designs, along with dozens of high-level, strategic electronic
- memos and thousands of scraps of financial and technical information.
-
- This control center is the "brain" of the worldwide network, where
- everything comes together. It is also where the most intense action takes
- place when things go wrong. Common problems are handled by specialized
- troubleshooting computers, or by system operators at local and reginal
- computer centers around the world. But if the troubleshooting computers break
- down, or the local system operators can't pinpoint the problem, or the network
- itself runs into trouble, then Al and his collegues must figure out what to do
- to keep the numbers crunching and the data flowing.
-
- Despite his title, Al is no typical "system operator." His actual duties
- would probably suggest the title of security officer or on-call handyman. In
- addition to keeping the printers full of paper, keeping track of the reels of
- magnetic tape, and helping users out with minor problems (as all system
- operators must do), Al is one of several highly trained support people who are
- on call twenty-four hours a day to resolve any potential hangups or security
- breaches in and among the many "nodes" of MegaCar's eletronic "filing
- cabinets."
-
- But whether or not your job includes watching for intruders, being a
- system operator on the graveyard shift means going through long periods of
- inactivity punctuated by brief periods of frenzied work. Al isn't
- anticipationg anything different tonight. Seated in front of a bank of
- computer terminals, a cup of coffee in one hand and a printout of the
- evening's computer activites in the other, he prepares for another uneventful
- round of crossword puzzles and solitaire, with perhpas some troubleshooting
- thrown in. Like some system operators, though, since he really likes
- computers and thinks of them both a hobby and a profession, tonight he is
- planning a special diverstion: COBOL, instead of cards.
-
- But on this particular night the routine is broken by some puzzling
- activity on a VAX superminicomputer at the corporation's top-secret research
- center.
-
- George, Al's collegue at the neighboring station, is browsing through the
- usage logs that record the activity of all the computers in MegaCar's
- far-flung network. As he does, he happens to notcie that the VAX is working
- hard - very hard. Even though the log shows only one person using the
- computer, the workload on the machine's central processor is high enough for
- ten or more users.
-
- It all starts with a few quiet words.
- "Al, I think something weird is happening on the net."
- "Which node?" Al replies, puttiong down his COBOL text and mentally
- preparing for a debugging job that might take thrity seconds, and then again
- might take all night, to clean up the problem.
-
- "4316. That's one of the R&D hosts in New York."
- "The New York VAX? What's wrong?"
- "I don't know. WHy don't you echo terminal 23 and see what you can make
- of it?"
- "Right."
-
- Al pulls his chair closer to his computer console, puts both hands on the
- keyboard, and rapidly taps out string of commands. Then he sits back and
- watches the central display monitor, as row after row of glowing green letters
- and numbers march across the screen. The central monitor is showing him
- everything that is happening on the VAX computer halfway across the country,
- in New York.
-
- After a few seconds, Al reaches for a telephone.
- "George, get me the name and home phone number of account STD123." Al's
- voice betrays his concern. HIs simple check of the activity on the VAX has
- made it obvious that something is wrong. The exact nature of the problem is
- not clear, but Al is certain that this is no run-of-the-mill software glitch.
- Either someone has been authorized to use excessive amounts of computer time
- every hour without letting the sytem operators know - or someone is doing
- something they shouldn't be doing with that computer.
-
- As soon as the account holder's name and phone number appear on his
- screen, Al makes the call. "Hello, Dr. Saunders? This is Al Frankston, the
- head system ooperator at the computer center. Sorry to disturb you at this
- hour, but we're reading some strange activity on the VAX. Are you using your
- account on that computer right now?"
-
- Like many other high-lvel personnel at the research center, Dr. Saunders
- has a computer terminal at home, so he can use the central computer via
- telephone link if he wants to have access to the day's research results or
- continue his own research. Al and George look at each other, as if to say,
- "Are you thinking what I'm thinking?" George listens to Al's phone
- conversation with interest as he continues to study the computer display still
- echoing the VAX's puzzling activity.
-
- "Thank you," Al replies, as Dr. Saunders confirms that he is, indeed,
- using the VAX. "OH, one more thing," he adds, "Would you tell me your social
- security number?...No, it isn't anything significant. It's just a little
- mix-up with our user account numbers. We'll have it straightened out by
- morning. Good night."
-
- Although he can see the same thing Al sees by looking at the display
- screen of his own console, George wheels his chair over to Al's station and
- watches with raised eyebrows as Al verifies the social security number he's
- been given.
-
- "It checks out," Al says, sounding puzzled.
- "You mean Dr. Saunders really is logged on now?" George asks, almost
- disapointed. "I was half hoping the account was being used by that hacker we
- almost caught last week."
- Al looks back at his screen. "No, I guess not...But there has to be a
- reason for that phantom time," he mubmles, scratching his chin.
-
- A loud voice suddenly breaks the quiet in the control room. "Hey Al!" a
- technician half shouts from the other side of the room. "There's a message
- for you coming over the laser printer. I think you better come and look at
- it."
-
- "Al and George exchange a quick glance, knowing looks creeping onto their
- faces. They leave their workstations and walk to a printer about the size of
- a washing machine. Pieces of paper are quietly dropping onto a large bin at
- the rate of about one sheet per second. George grabs one of the pages.
-
- There is a large headline at the top: "A note to the chief system
- operator on duty." Below that, in slightly smaller type, are the words
- "Please make sure the sysop reads this. Thank you." IN normal type, the
- message continues: "It should be noted that computer print-outs currently are
- not legal evidence in court."
-
- George starts to read the message aloud, his voice a mixture of annoyance,
- admiration, and puzzlement. "It is our opinion that you should be more
- careful about your sesign plans for the TRX project." HIs voice drops and
- grows more serious as he reads the next sentence. "One of us suggested that
- maybe we should sell the information to another car company."
-
- Now, Al starts reading over George's shoulder - and they both read
- ssilently. "Several of us don't think there is anything wrong with ripping
- off a company as big as yours. But some of us think that industrial espionage
- would break our unwritten hacker laws. We may vote on the subject in the near
- future. In any case, we would like to have one or more unlimited user
- accounts so that we do not have to go to the trouble of calling your ALF node
- by way of SYSNET12. We can't use 1200 baud through SYSNET12. Of course, if
- you decide to grant us a little assistance of this sort, it could be that we
- would all be more kindly disposed toward your institution when we vote on what
- to do with the TRX data."
-
- "What do you think?" aks George.
- Al is leafing through the now very large pile of paper in the output bin.
- "They're all the same. What's TRX?"
- George thinks momentarily. "I don't know. They must have made it up. It
- has to be a bluff."
-
- Seconds later, as if on cue, another printer starts shooting out more
- sheets of paper. Al looks grim when he sees what these latest mystery sheets
- have to say. "Well, maybe they're bluffing about selling the stuff, but I
- don't think they're bluffing about having it. These look suspiciously like
- design memos for next year's car!"
-
- Al studies the new sheets for a minute, then continues, tension rising in
- his voice. "We still don't know where those hackers are! All we know is,
- they're not using Dr. Saunder's account."
-
- Suddenly, a new through dawns on them, and they almost run in their hurry
- to get back to their workstations. Both sysops look at their screens. "They
- may have altered the monitor program on my terminal so I cna't find them or
- their account," Al mutters, souinding hopeful. "But if they did, they may not
- have changed the programs that run on our other terminals. I 'm going to
- break out of my version and use some of the other monitoring programs - see if
- there is anything different between mine and the other's log-on sequences or
- lists of account names."
-
- After several minutes of frantic typing, George walks over to Al's
- station. He looks at the screen, pondering something, then he walks back to
- his own station, glances at his own screen, and bursts out in suprise,
- "Someone new is logging onto the VAX. Turn your monitor program back on."
-
- Al stops checking and runs his monitoring program. "That 'someone' is
- using an old test account. I could have sworn we killed them all months ago,"
- he says.
-
- George is watching the same display. "Funny, but I thought so, too.
- Either we let that one slip, or those hackers reactivated it. But it doesn't
- make any difference. No one's authorized to use that account now anyway,
- so..."
-
- "Right. So we have our hacker!" Al sounds proud of himself. He has been
- worried, but now the game is over. "Let's break in and let him know how we
- feel before we throw him off the system."
-
- "Oh, yeah," says George sarcastically. "And while you're at it, ask him
- how he got that valuable data." George holds up one finger, as if counting.
- "And then see what he plans on doing with it." He holds up a second finger.
- "And find out how..."
-
- Al inturrupts: "Okay, okay. So we still have a lot of work to do. Let's
- get started."
-
- They both go over to a single terminal and Al starts to type. He uses the
- monitoring program to trace the source of the intrusion, then gives the system
- a few commands that allow him to break in and communicate with the person
- using the unauthorized account. Then, he types: "OK. We know who you are
- and what you did. Either cooperate or we will press full charges."
-
- After a short pause, a rapidly typed reply apprears on the display screen:
- "Year, sure. I guess you guys are just too smart for me. Anyway, all humor
- aside, I was just sent to this account by my friends to get your reply to our
- offer. Have you decided to give us those unlimted accounts yet?"
-
- Al chuckles while he types: "Why should we? We can just have you
- arrested! Besides, it isn't our computer. We can't just decide to assign an
- unlimted account to somebody outside the corporation."
-
- The hacker types back: "Oh, so you'll just call up the police and say,
- 'There's this hacker on our system and we suspect he just may be somewhere in
- the 50 states. We can't be sure exactly where...?' It's never worked before,
- but what the hell - go ahead and try. It'll be fun. Meanwhile we'll play
- with this TRX stuff."
-
- George now pushes in front of Al and commandeers the keyboard, typing:
- "We have you traced. We know who you are and where you are. We just want to
- ask you a few questions."
-
- "About security, right?" the hacker types back. "Well, I'm sure you will
- have no more security problems if you help us out. You have fairly good
- security without our advice. Only the best could have done what we've done.
- And that's who we are: the best. So I guess you could say that your future
- security problems are pretty much up to us. There is another possibility,
- though."
-
- George, still at the keyboard, hesitates a moment, then types back: "And
- what's that?"
- "Well, we could post our information about your system on a few bulletin
- boards. Then a few hundred lesser talents would try to log on. I'll be a
- crasher would have fun with this VAX or that beautiful DEC-20 in Detroit. And
- there's always the possiblity that another large car company would let us use
- their system in exchange for the dat we have. You can never tell about these
- things."
-
- Al is not amused. He snaps a pencil in half whle thinking over a reply.
- Geroge is almost speechless. Arrogant little..." he is beginning to say, when
- Al finially types: "We'll have to think about this. You guys might just be
- half as smart as you think you are. By the way, how do we reach you? Can you
- give us your phone number?"
-
- "I'm glad the bad news hasn't ruined your sense of humor," replies the
- distant adversary. "Let's just say that we'll get in touch in our own way, in
- our own time. The way we always do. In the meantime, I guess it wouldn't
- hurt to give you a little tidbit for your trouble. Why don't you tell all
- your users that SECRET is a lousy choice for a password? I'll bet I've
- crakced a dozen systems with that one. Stay tuned and keep designing those
- sexy cars. Bye."
-
- Although, in actuality, hackers and most system operators tend to speak in
- a much less comprehensible language, and most hacking experiences tend to
- involve much less conspicuous companies, hackers did manage to find and look
- at secret sdesign specifications and test results. These particular hackers
- did not attempt, or ever intend, to sell or trade "MegaCar's" priceless files
- to a competitor...but someone else might not have been so "honorable."
- That's the point of this book, and if you are concerned about computer
- security, whether as a computer profession or as interested citizen, I hope
- you will benefit from what I learned as The Cracker, inside the Inner Circle.
-
-
-