Hacking For Beginners – Manthan Desai

2010

home directories, many system files, and all of the user spool mail had been deleted.[1998 Feb 25] MIT Plasma & Fusion Center (PSFC) and DoD computers hacked by Ehud Tenebaum ('Analyzer'). TheMIT computer was running an old version of Linux , the vulnerability which facilitated intrusion. After gaining access to anaccount, the hackers took advantage of other security holes and installed a packet- sniffer. The hackers were able tocollect user names and passwords to computers outside the network.

[1998 Feb. 26] Solar Sunrise, a series of attacks targeting Pentagon computers, leads to the establishment of round-theclock, online guard duty at major military computer sites.

[1998 Feb 27] The 56-bit DES- II-1 challenge by RSA Data Security was completed by a massively distributed array ofcomputers coordinating their brute- force attacks via the distributed.net "organization." The cleartext message read,"Many hands make light work." The participants collectively examined 6.3 x 10^16 keys — fully 90 percent of the entirekeyspace — in about 40 days.

[1998 Mar 3] Santa Rosa Internet Service Provider NetDex rehacked by Ehud Tenebaum ('Analyzer'), retaliation overthe arrest of his two U.S. hacker friends ('Cloverdale Two').

[1998 Mar 18] Ehud Tenebaum ('The Analyzer'), an Israeli teen-ager is arrested in Israel. During heightened tensions inthe Persian Gulf, hackers touch off a string of break- ins to unclassified Pentagon computers and steal softwareprograms. Officials suspect him of working in concert with American teens to break into Pentagon computers. Then-U.S.Deputy Defense Secretary John Hamre calls it "the most organized and systematic attack" on U.S. military systems todate. An investigation points to two American teens. A 19-year-old Israeli hacker who calls himself 'The Analyzer' (EhudTenebaum) is eventually identified as their ringleader and arrested. Israeli Minister Benjamin Netanyahu callsTenebaum "damn good ... and very dangerous." The attacks exploited a well-known vulnerability in the Solaris operatingsystem for which a patch had been available for months. Today Tenebaum technology officer of a computerconsulting firm.

[1998 Mar 20] Two teenagers hack T-Online , the online service Germany's national telephone company, and stealinformation about hundreds of bank accounts. The two 16-year-old bragged about their exploits, callingDeutsche Telekom's security for the online service "absolutely primitive".

[1998 Apr] Shawn Hillis, 26, of Orlando, Florida, a former employee of NASA contractor Lockheed Martin Corp. , pledguilty in Federal district court to using a NASA workstation at the Kennedy Space Center to gain unauthorized access tocomputer networks of several Orlando businesses.

[1998 Apr 20] An Alabama juvenile hacker launches an e-mail bomb attack consisting of 14,000 e-mail messages acrossa NASA network against another person network systems in a commercial domain. The youth was later ordered toprobationary conditions for 12 months.

[1998 Apr 22] The MoD criminal hacker group (Masters of Downloading, not to be confused with the 1980's groupMasters of Deception) claimed to have broken into a number of military networks, including the DISN (DefenseInformation Systems Network); and the DEM (DISN Equipment Manager), which controls the military's global positioningsatellites (GPSs).

[1998 May] Members from the Boston hacker group, L0pht (now @stake ), testify before the U.S. Senate about Internetvulnerabilities.

[1998 May 30] A criminal hacker used the sheer size of AOL's technical support (6,000 people) to social engineer hisway into the ACLU's web site. The attacker repeatedly phoned AOL until he found a support technician foolish enough togrant access to the targeted web site, which was wiped out as a result of the attack.

[1998 Jun 30] Former Coast Guard employee, Shakunla DeviSingla, entered a personnel database she had helpeddesign. DeviSingla used her experience and a former co- worker ’ s password and other identification to delete data. Heraction required 115 employees and 1800 hours to recover the deleted information

[1998 Jul 31] During Def Con 6 The Cult of the Dead Cow (cDc) release Back Orifice (BO), a tool for analyzing and

www.hackingtech.co.tv

Page 247