Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker



Download 2,97 Mb.
Pdf ko'rish
bet96/121
Sana05.05.2023
Hajmi2,97 Mb.
#935282
1   ...   92   93   94   95   96   97   98   99   ...   121
Bog'liq
1 - Ghost in the Wires My Adventures as the World\'s Most Wanted Hacker issue 15th Aug 2011 ( PDFDrive )

New York Times
story appeared, I discovered he
had an account on the Well. An easy target: I had been reading his emails
ever since, searching for anything related to me.
After I finished moving the targeted stuff, we decided to just grab
everything
in Shimmy’s home directory. JSZ archived and compressed his
entire home directory into a single file that amounted to more than 140
megabytes.


We held our breath until the file was successfully transferred, then gave
each other electronic high-fives over chat.
JSZ moved a copy of the file to a system in Europe in case some Well
system admin happened to find the huge file and delete it. I also copied the
file to a couple of other locations.
JSZ kept telling me that finding the simple backdoor he had set up for
my access would be easy for Shimmy. I agreed: it was too easy to find. I
suggested that we consider placing a more sophisticated backdoor in the
operating system itself, where it would be much harder to detect.
“He’ll find it,” JSZ countered.
“Yeah, we could always get back in later the same way,” I said.
I logged off the system, and JSZ cleaned up, removing the simple
backdoor and deleting all logs of our activity.
It was a very exciting moment. We had gotten into the security expert’s
server—in my case, for the 
second
time in little over a year. JSZ and I
decided we would each examine Shimmy’s files independently and then
report back to the other on what we found.
But no matter how careful we were to erase our tracks, I figured it was
almost certain that Shimmy would stumble onto some telltale sign we had
overlooked.
Sifting through Shimmy’s old emails, I came across messages back and
forth between him and my nemesis, 
New York Times
technology scribe John
Markoff. The two of them had been exchanging emails going back to early
1991 about me—trading bits of information on what I was up to, as in an
exchange in early ’92 that showed Shimmy had gone to the trouble of
researching online for my ham radio license, call sign N6NHG. He also
emailed Markoff asking whether the FCC had a rule against issuing ham
radio licenses to a person convicted of a felony.
Why the two of them had such an interest in me was still a mystery. I
had never met Shimmy, never interacted with him in any way except for the
recent hacks into his system.
So why would the two of them be so interested in what I was doing?
I was right about one thing: Shimmy very quickly learned of our break-
in. Because JSZ and I were both so focused on getting a copy of his files,
we didn’t notice that he was running “tcpdump”—a network monitoring
tool to capture all network traffic. We also didn’t notice that a program
called “cron” was periodically emailing his system logs to Andrew Gross,


Shimmy’s assistant. Gross realized the logs were getting smaller and tipped
off Shimmy that something suspicious was going on. As soon as Shimmy
looked through the logs, he realized he had been hacked.
It didn’t matter much. We had his files, and we would spend the days
and weeks ahead carefully examining them.
Why would Shimmy be running a network monitoring tool to capture
everything going through his server? Paranoia? Or was it a bait machine?
Because he was so high-profile in the computer security world, he knew it
was just a matter of time before someone would nail his butt with a clever
new attack. I thought maybe it was a bait machine, left accessible so he
could monitor all the incoming attacks and profile the methods being used.
But in that case, why would he leave all his files on this machine, and even
a network wiretapping tool called “bpf”—for Berkeley Packet Filter—that
he had created for the United States Air Force, which could insert itself
directly into an operating system without requiring a reboot?
Maybe he just underestimated his opponents and assumed no one would
ever get in. It’s still a mystery.
Many people credit me with being the guy who developed the program that
was used to hack into Shimmy’s servers using the IP spoofing attack. I’d be
proud if I really had been the one who managed that rather astounding feat,
and I’d be glad to take credit for it. But the credit’s not mine. Instead, that
honor belongs to the wickedly clever JSZ, the guy who actually participated
in developing the tool and used it for our Christmas Day break-in to
Shimmy’s server.
I had enjoyed my time back in Denver for the holidays, especially because
we were able to get into Shimmy’s system. But time was up: I needed to put
that grand city behind me and push off for my next destination.
I was still elated about the success of the Shimmy hack. But I would live
to regret it. Those few hours would eventually lead to my undoing. I had
unleashed a hacker vigilante who would stop at nothing to get even with
me.



Download 2,97 Mb.

Do'stlaringiz bilan baham:
1   ...   92   93   94   95   96   97   98   99   ...   121




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish