RSS

Monthly Archives: October 2000

Finding the Last Hackers.

Finding the Last Hackers.

This journal is an examination into psychology and into the computer sciences to find the last of, or the newest real hackers still out there. What is a real hacker? A hacker is an individual who has extensive knowledge about computer systems, and usually has a desire to enter other computer systems and networks one is not usually allowed into. Most hackers are merely curious, others are vindictive, attempting to shut down a computer system for their own personal gain or vengeance, and others are merely an annoyance. Annoyance hackers are the ones you usually hear of on the 10 O’clock news, the ones who shut down useful web sites, just because they can. The last group is the most worrying, the way they attack web sites is difficult to stop once it has started. With enough attacking computers, even the best sites can be taken down. Enough of the definitions, on to the hunt.

The first foray was into an innocuous chat room knows as ” The Hackers Lounge.” As I knew, the chances of me actually meeting a real hacker were slim. On a recent occasion, I bumped into one of the last real hacker/super users out there. He was running FreeBSD (Note 1) and noticed my attempts at trying to access his computer, since he had put out his IP address as a taunt to one of the younger wanna-be’s in the chat room. He had begun by asking this supposed other hacker what a myriad of different computer anagrams meant, which he failed to answer a single one. It was at that time he posted his IP address for all to see. It was a bold move, but like myself he had an operating system that was, at the least, hard to get into. He had gone a step further, as I found out in my conversation with him, by port spoofing many of his ports on his computer. Spoofing is a way to make hackers or people who want to find vulnerability in a system think that it can be accessed, but the ports go no where.

He turned out to be a 24 year old NT and UNIX administrator. Its always ironic that all meet all kinds of NT MSCE people…who run Linux, UNIX, or FreeBSD on their own, personal system. Or, they manage an NT domain that is run on a Samba Server, under Linux. Why, if these people are Trained by Microsoft, to use Microsoft products, do they use a UNIX based operating system? That is a question for another time.

The NT administrator, I’ll call him Axis, (A shortened version of his screen name) turned out to be a pretty nice guy. Has 2 kids, lives in Wisconsin, and has a really good job. My supposition now is that nearly anyone who has the deep talent at hacking, usually won’t because they have far too much to loose in the short and long term. The only people who can hack with real impunity, are younger people, people younger than 16 who really can’t be tried as adults. The problem with this is that it takes years, sometimes, to accumulate the knowledge necessary to hack properly. This is not to say young people don’t or can’t hack, the very opposite in fact.

With the enthusiasm of youth, and raw talent, a lot can be done, but I have not been able to find one of these talented young ones, or someone who has been in it so long, they still do it for fun. The last possibility is the older, retired computer professional, who started on punch cards and vacuum tubes who knows everything about computers. This last group is only really a theory right now, I felt I have only met the first 2 over the years of surfing, but with everyone getting online, its only time.

The second individual I met, after starting this little journal, is someone I want to call a paranoid. His screen name was humorous, so lets call him Mr. Giggles. Mr. Giggles was looking for help to stop “a group of evil hackers” who were “sending death threats” to people in real life. I decided to humor him, and see what he was talking about. The first supposed hacker he wanted me to look into, was a fast moving bot. A bot is a piece of computer code that runs in a chat system, usually to advertise a pornographic or really any type of web site. He thought that the bot was actually a person who moved room to room quickly to avoid him, ending up with crashing him. What was really happening was that the bot was doing what it normally does, go to a room, post a link to the page, and move on. The reason someone who tries to follow it seems to crash, is that whatever chat interface they are using is not really designed to change rooms like that. Eventually the chat program or Java applet crashes, and will cause a windows based computer to crash or lock up. I told him what it was, and why it did it. At first he did not believe me, but then he came to accept it.

The second person he wanted me to look into was a man in the chat room, lets call him Tex. Well, Tex wasn’t very belligerent in chat room, in fact, he seemed like a normal chatter. It was Mr. Giggles who was trying to start a fight in the chat room. I decided to do a little gentle probing or Tex’s computer, to see what he was. I found he was really in Texas, outside of Dallas. His computer was just a standard Windows 98, first edition machine. No security set. If it was a hacker, he didn’t do it on that machine. It was at that point I started to feel used for my abilities by Mr. Giggles. There was a third person he wanted me to look into, but I just fed him a string of lies, since I didn’t want to intrude on any more innocent peoples computers.

Mr. Giggles was either someone just trying to get someone else to get into a computer for them, since they didn’t’ have the talent, or else he was just a paranoid person who knows a lot about a small area of computers, and thinks he knows a lot about everything with computers. He claimed that he was a Cisco and Novell engineer. This I could actually believe since most IT people don’t know much outside of their tiny little area of expertise. He could not even answer a simple question, like what sort of corporate firewall he was behind. He seemed to lack any general computer knowledge at all. He didn’t know what Linux was, or even UNIX for that matter. That put up a red flag that Mr. Giggles was just a paranoid person, seeing threats where there were none. I stopped communicating with him then, annoyed I was taken in by his paranoia, and I vowed to be more careful next time.

The next incident was a bit more interesting, and a little more risky on my part. I met a younger person on Yahoo chat, hackers lounge. (Note 2) He was looking for someone to help him to learn how to hack. I felt like passing on a little information, so I started talking to him. He was above average computer user, been using windows based PC’s for about 6 years or so with a small smattering of UNIX commands. Never done anything outside of regular web surfing and e-mail. Had no idea what telnet was or anything like that, so I started with Telnet. I told him how to open up the telnet client in Windows 98, and gave him my IP address so he could try to log onto my computer. I have a guest account set up in case some one needs to log on, and I don’t want to set up a new account.

It made me smile, how excited he was when he successfully logged onto my computer, and got a “Welcome to linux mandrake 2.2.14-15MDK. (Note 3) He knew enough commands to get a file listing and move around a few directories. This is when I realized my computer security settings weren’t as high as I wanted them. I let him poke around a while a learn some more about Linux, but I had to cut him off eventually. Almost immediately after he logged off my computer, I upped the security level 2 points, and canceled that guest account. Its not that I’m paranoid, but it was too easy for him to log onto my machine. It was a learning experience for the both of us. If you are reading this, don’t’ try to remotely log onto another home version of Windows (95, 98, 98 SE, ME) using telnet. 99 times out of 100 you will simply crash their computer. Entertaining, but not very useful.

That’s all for now, read on every day to see who I have met, and what I have added.

Notes

1 As a side note, the Linux operating system and Free BSD is based on UNIX. Briefly, UNIX based operating systems were designed with networks involved, in fact they cannot operate without a network. Even my own, single computer, has to act like a little server and workstation talking back and forth to each other to work properly. It is transparent to the user, but very visible to someone trying to hack into from the outside. When a external user attempts to access the system, the server part of the operating system treats it like a new user trying to log onto the system. With the security level set to high on the system, virtually no access ports are granted to the outside systems. When a hacker tries to enter the system, a user name and password is required, if it is not provided in 3 attempts, the user is locked out. Even if a user manages to get logged on, they will only have user level access. User level access only allows access to applications to run, but cannot modify directories or files that are not in their “home” directory. The only exception to this is when an user logs on as the super user, or root as it is also know. This can and does happen when the administrator uses no or a weak password. Once a user is logged on as root, they have complete control of the operating system. The level of control is one not usually found in a DOS/Windows based system. It allows the user to change or delete any file, or file system, with no asking the user if they are sure. If a hacker logs in as root, they can easily and quickly delete the entire system from under the user, with virtually no chance of recovery. This not meant to dissuade the use of UNIX based computers, but as a warning to use very good passwords and change them religiously. The other advantage to UNIX based systems is the fact the number of viruses for UNIX can be counted on one hand. This, again, relates back to the fact that it is a client/server model. If a virus is written, unless the user is root, it can only spread to the users own files and not to others. Ironically, UNIX based computers can cheerily pass on viruses meant for DOS/Windows with no ill effects. Many DOS/Windows based true viruses are created on UNIX based computers because of this immunity. The immunity to DOS/Windows based viruses is also because the different file system used. UNIX usually uses the Extended 2 file system, with no FAT tables. Theoretically, successful viruses can be written for UNIX based systems, but there seems to be no concerted effort on the virus writers part. There are currently no know “in the wild” viruses for UNIX based systems. The last written virus was discovered in September of 1998 on a single network, and was harmless. The virus was created as an experiment by the root user. Windows averages between 200 to 1200 new viruses a month.

2 If you would like to chat with the author, you can find him in the Yahoo chat area, or you can try Sandbender14 on Yahoo Pager. Yahoo was good enough to make a Linux version of Yahoo Pager. You can also reach him on ICQ UIN# 1696894. Or you can do the old fashioned email to let me have your comments on this article or the site in general.

3 The author uses Linux Mandrake 7.0 running Kernel 2.2.14-15. I choos

 

Posted by on October 22, 2000 in Computers, General Comments

Leave a comment

Linux Vs. Windows

The Linux operating system is misunderstood on many levels. At first, even I made the mistake of thinking you always have to pay to get a quality product with support. After 7 years of using Microsoft products, I learned that even when you pay a high licensing fee, you still do not get support or a good product. Have you every tried to call their Technhotlinepport hotline? Mind you, it is Not a toll-free number to call. The average wait time is well over 2 hours. 2 hours, to Redmond, Washington. I have never actually spoken to a live representative from Microsoft, after running up almost $15 in phone fees, I figured it would be easier to do it myself.

When you think commercial software, you think, oh, a nice box and instructions should be included for this $89.99 upgrade. In fact, you get a cheap cardboard holder and an instruction manual that barely even explains how to install the software, no less use it. After you struggle with the install, which includes finding every single driver for every singe Plug and Play device on your system. (If its plug and play, why do I need a driver?) You find that your $89.99 upgrade gives you an operating system, 4 ancient computer games, and a web browser…and that’s about it.hugheat deal,hugh?

If you go to a store to buy a copy of Linux (You don’t have to buy it, you can download it for free!) You get for $29.99 (orcdoromsg): 3 cd roms in a professional looking holder, no serial number to enter, a 300 some odd page user s manual,and a 60-page installation manual. The installation process is so easy I could not believe it the first time I did it. All I had to tell it was what language I wanted, where I wanted it installed, and how many programs I wanted installed. No special drivers were needed for my hardware. All the plug and play devices were just that, plug and play. After the painless and short install process, which involved no restarts, I found a very complete, mature, and well equipped environment to work with. Linux included several word processors and spread sheets, a whole office suite, dozens of games, ainternets of internet programs. It even includes a professional web server and many compilers to create my own programs. In total, nearly 2000 applications were included in the Linux distribution I purchased. Compare that to SWordpade and Wordpad included with windows.

 

Posted by on October 15, 2000 in Computers, Linux

Leave a comment