怎樣黑進Microsoft:循序漸進指南 (轉)
怎樣黑進Microsoft:循序漸進指南 (轉)[@more@]How you into : a step by step gu to:thomas.greene@theregister.co.uk">By: Posted: 31/10/2000 at 12:42 GMT
Microsoft's recent sacking at the hands of unskilled malicious ers has engendered a vast cloud of false scent from company flacks, who in past days have progressively shrunk their damage assessments. According to company s, the intruders had access for only 12 days, not six weeks as first reported, and did not corrupt any software in development.
Others note that, twelve days or not, the intruders can't have helped stealing the source code for the new versions of ME/2K and , and might well have implanted back doors, laying the foundation for easy remote exploitation once the finished products reach the marketplace.
So, were the walls of the castle breached? Was the digital diadem of William Perfidious defiled by the grubby hands of the unwashed? Or did a handful of malicious kiddies manage nothing more than to give the King of Gates a scare? We don't pretend to know; but we're going to walk you through the likely steps the intruders would have taken, and let you decide how much damage they might, or might not, have done.
Barbarians at the gate
.NETwork security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbcracker can succeed by using pat scripts and casting his nets wide enough.
The Microsoft intrusion was almost certainly not the work of elite s; if it had been, we would not now be reporting it. What we're going to detail below is how a fool can (and did) sack the Magic Kingdom.
Everything the newbie cracker needs to break in to the Microsoft Developers' Network is readily available on the following a brief search. Here's how you go about it: First, you'll a Trojan which can be distributed via . QAZ, which was used in the M$ attack, is a fine choice because it will automatically copy itself throughout shared folders on a LAN. It's a malicious program masquerading as the familiar Microsoft utility Notepad.
Once activated, QAZ searches for notepad.exe and copies itself in place of the standard Notepad file, while simultaneously re-naming it note.com. The beauty here is that when someone executes their Trojanised Notepad, it also launches note.com, or the original Notepad, so the application appears to behave normally to the user. It then searches the entire LAN for additional copies of notepad.exe to infect.
To get it implanted on a LAN in the first place, you need to feed it to someone dense enough to execute it. It's easy enough to distribute as an e-mail attachment, but not everyone will fall for it. Thus there are two chief obstacles to getting started, neither of which is terribly difficult to overcome.
First there is social-engineering - that is, baiting the victim. The ing of the e-mail message has got to make executing the attached program both desirable and sensible. Presenting it as a software patch or upgrade is a common stratagem, though there are others. Zip it and naming it PornCollection.zor DirtyJokes.is another.
If the e-mail message makes sense in context of the attachment, and if it's sent to enough potential victims, the combined laws of probability and human nature ensure that some dumb bastard will activate the payload. And with QAZ, you only need one victim; it will propagate on its own.
Your second obstacle is anti-virus software. Not a tough one either, despite all the glowing claims of heuristic genius touted by anti-virus vendors. We took several of the most popular Trojans: Back Orifice, SubSeven, NetBus and Hack'a'Tack, and first verified that our copy of AntiVirus would detect them, both as-is and zipped. We then compressed them using a sweet little developer's tool called and ran Norton AntiVirus again.
Not one Trojan was detected, because NeoLite alters the signatures used by anti-virus manufacturers to identify malicious code. Only the Trojan Deep Throat, which we received already compressed by NeoLite, was detected, presumably because it's usually distributed in that foand its compressed signature is known. And the beauty of NeoLite is that it's self-extracting. No third-party software like need be loaded on the victim's machine for the compressed programs to be executed.
On the inside
Once you've managed to infect a machine on the target LAN, QAZ will e-mail you the IP automatically, activate WinSock and wait for a connection on port 7597. Simply check your mail, connect, and, voila, you're in. We're assuming you have the sense to use a Web-based e-mail account for QAZ to communicate with, which you will have opened with fictitious personal data, and that you know the basics of concealing your computer's IP.
Now you'll need to swim around inside the LAN sharkwise until you find yourself a nice, juicy target. Be patient; as the Trojan spreads, more machines will come on-line for you to connect to. Check them all thoroughly. What you're looking for is a box to which you can connect directly, and which is trusted by your ultimate target - some machine with valuable data on it.
You can pretty well assume that any box containing real treasures will be protected by a . You probably won't be able to connect directly to it with a Trojan, but that's all right. There are other machines on the LAN which your target box will trust. So find out which of the boxes to which you can connect might themselves be plugged into something sweet, like another box with the source code for Win-2K, par example. The strategy here is to leapfrog from machines which you own, to the one you want to own.
Where do you want to go today?
Now you've got access to a machine with interesting, valuable data. Let's say it's on the MS Developers' Network, and contains the source code for Win-2K. What's your next move?
It would make sense to download the code first so that if you're suddenly divered and shut out, you'll at least have something to show for your efforts. Source code is jealously guarded and of course extremely valuable to Microsoft's competitors. Owning it can be immensely profitable for you, especially if you know a sleazy development house in a country with virtually no piracy enforcement, like in Russia, say, or anywhere in East Asia.
You might also wish to implant malicious code of your own in the source to make it easy to exploit once it reaches market, or, alternatively, examine it closely for weaknesses already coded into it, to get a jump on the competition once it ships. A lot of valuable data gets served up on these products; merely knowing where the weaknesses are before the security industry catches on can lead to considerable riches.
So how difficult would that be? Obviously, profiting from such an intrusion requires skill; though as we've illustrated, getting inside the network is child's play. You might be a dangerous cracker, and one so clever that as part of your social-engineering strategy you've deliberately opted to use common tools and techniques to conceal your true, terrifying capabilities. But then again, you might not.
More likely you're a young fool with virtually no skills and little ambition, snapping up toolz and appz from the Web and feeling your way blindly towards the cracker pantheon. You'll do no harm because you don't know how to do harm, but you'll think quite highly of your insignificant achievements. You'll recall your modest exploits with fondness, boast about them in IRC h4x0r chatrooms hoping to impress some k1dd13 even lamer than yourself, and get busted by one of the hundreds of Feds who regularly hang out in these venues.
And that, more than anything, is what Microsoft is fervently hoping. ®
Related Stories
source?
Microsoft's recent sacking at the hands of unskilled malicious ers has engendered a vast cloud of false scent from company flacks, who in past days have progressively shrunk their damage assessments. According to company s, the intruders had access for only 12 days, not six weeks as first reported, and did not corrupt any software in development.
Others note that, twelve days or not, the intruders can't have helped stealing the source code for the new versions of ME/2K and , and might well have implanted back doors, laying the foundation for easy remote exploitation once the finished products reach the marketplace.
So, were the walls of the castle breached? Was the digital diadem of William Perfidious defiled by the grubby hands of the unwashed? Or did a handful of malicious kiddies manage nothing more than to give the King of Gates a scare? We don't pretend to know; but we're going to walk you through the likely steps the intruders would have taken, and let you decide how much damage they might, or might not, have done.
Barbarians at the gate
.NETwork security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbcracker can succeed by using pat scripts and casting his nets wide enough.
The Microsoft intrusion was almost certainly not the work of elite s; if it had been, we would not now be reporting it. What we're going to detail below is how a fool can (and did) sack the Magic Kingdom.
Everything the newbie cracker needs to break in to the Microsoft Developers' Network is readily available on the following a brief search. Here's how you go about it: First, you'll a Trojan which can be distributed via . QAZ, which was used in the M$ attack, is a fine choice because it will automatically copy itself throughout shared folders on a LAN. It's a malicious program masquerading as the familiar Microsoft utility Notepad.
Once activated, QAZ searches for notepad.exe and copies itself in place of the standard Notepad file, while simultaneously re-naming it note.com. The beauty here is that when someone executes their Trojanised Notepad, it also launches note.com, or the original Notepad, so the application appears to behave normally to the user. It then searches the entire LAN for additional copies of notepad.exe to infect.
To get it implanted on a LAN in the first place, you need to feed it to someone dense enough to execute it. It's easy enough to distribute as an e-mail attachment, but not everyone will fall for it. Thus there are two chief obstacles to getting started, neither of which is terribly difficult to overcome.
First there is social-engineering - that is, baiting the victim. The ing of the e-mail message has got to make executing the attached program both desirable and sensible. Presenting it as a software patch or upgrade is a common stratagem, though there are others. Zip it and naming it PornCollection.zor DirtyJokes.is another.
If the e-mail message makes sense in context of the attachment, and if it's sent to enough potential victims, the combined laws of probability and human nature ensure that some dumb bastard will activate the payload. And with QAZ, you only need one victim; it will propagate on its own.
Your second obstacle is anti-virus software. Not a tough one either, despite all the glowing claims of heuristic genius touted by anti-virus vendors. We took several of the most popular Trojans: Back Orifice, SubSeven, NetBus and Hack'a'Tack, and first verified that our copy of AntiVirus would detect them, both as-is and zipped. We then compressed them using a sweet little developer's tool called and ran Norton AntiVirus again.
Not one Trojan was detected, because NeoLite alters the signatures used by anti-virus manufacturers to identify malicious code. Only the Trojan Deep Throat, which we received already compressed by NeoLite, was detected, presumably because it's usually distributed in that foand its compressed signature is known. And the beauty of NeoLite is that it's self-extracting. No third-party software like need be loaded on the victim's machine for the compressed programs to be executed.
On the inside
Once you've managed to infect a machine on the target LAN, QAZ will e-mail you the IP automatically, activate WinSock and wait for a connection on port 7597. Simply check your mail, connect, and, voila, you're in. We're assuming you have the sense to use a Web-based e-mail account for QAZ to communicate with, which you will have opened with fictitious personal data, and that you know the basics of concealing your computer's IP.
Now you'll need to swim around inside the LAN sharkwise until you find yourself a nice, juicy target. Be patient; as the Trojan spreads, more machines will come on-line for you to connect to. Check them all thoroughly. What you're looking for is a box to which you can connect directly, and which is trusted by your ultimate target - some machine with valuable data on it.
You can pretty well assume that any box containing real treasures will be protected by a . You probably won't be able to connect directly to it with a Trojan, but that's all right. There are other machines on the LAN which your target box will trust. So find out which of the boxes to which you can connect might themselves be plugged into something sweet, like another box with the source code for Win-2K, par example. The strategy here is to leapfrog from machines which you own, to the one you want to own.
Where do you want to go today?
Now you've got access to a machine with interesting, valuable data. Let's say it's on the MS Developers' Network, and contains the source code for Win-2K. What's your next move?
It would make sense to download the code first so that if you're suddenly divered and shut out, you'll at least have something to show for your efforts. Source code is jealously guarded and of course extremely valuable to Microsoft's competitors. Owning it can be immensely profitable for you, especially if you know a sleazy development house in a country with virtually no piracy enforcement, like in Russia, say, or anywhere in East Asia.
You might also wish to implant malicious code of your own in the source to make it easy to exploit once it reaches market, or, alternatively, examine it closely for weaknesses already coded into it, to get a jump on the competition once it ships. A lot of valuable data gets served up on these products; merely knowing where the weaknesses are before the security industry catches on can lead to considerable riches.
So how difficult would that be? Obviously, profiting from such an intrusion requires skill; though as we've illustrated, getting inside the network is child's play. You might be a dangerous cracker, and one so clever that as part of your social-engineering strategy you've deliberately opted to use common tools and techniques to conceal your true, terrifying capabilities. But then again, you might not.
More likely you're a young fool with virtually no skills and little ambition, snapping up toolz and appz from the Web and feeling your way blindly towards the cracker pantheon. You'll do no harm because you don't know how to do harm, but you'll think quite highly of your insignificant achievements. You'll recall your modest exploits with fondness, boast about them in IRC h4x0r chatrooms hoping to impress some k1dd13 even lamer than yourself, and get busted by one of the hundreds of Feds who regularly hang out in these venues.
And that, more than anything, is what Microsoft is fervently hoping. ®
Related Stories
source?
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/10752043/viewspace-995501/,如需轉載,請註明出處,否則將追究法律責任。
相關文章
- 循序漸進學加密加密
- 循序漸進linux(二)Linux
- 務實發展,循序漸進
- 循序漸進理解TypeScript型別模式TypeScript型別模式
- 循序漸進DIY一個react(二)React
- 循序漸進DIY一個react(四)React
- 循序漸進DIY一個react(三)React
- 循序漸進DIY一個react(一)React
- Matplotlib學習筆記2 - 循序漸進筆記
- 【Python語法】循序漸進理解閉包Python
- 循序漸進掌握遞迴正規表示式遞迴
- [翻譯]測試人員成為業務分析師的循序漸進指南
- 循序漸進的用js實現一個bind()JS
- 循序漸進 Redis 分散式鎖(以及何時不用它)Redis分散式
- 使用C#的後端Web API:循序漸進教程後端WebAPI
- 自動化響應要循序漸進 不能一蹴而就
- 《程式設計的原則》重新發明車輪感悟之循序漸進程式設計
- 循序漸進學.Net Core Web Api開發系列【14】:異常處理WebAPI
- 循序漸進學.Net Core Web Api開發系列【4】:前端訪問WebApiWebAPI前端
- 循序漸進!開展零信任建設時應做好的16項準備
- 循序漸進學.Net Core Web Api開發系列【9】:常用的資料庫操作WebAPI資料庫
- WePack —— 助力企業漸進式 DevOps 轉型dev
- 解密prompt系列34. RLHF之訓練另闢蹊徑:循序漸進 & 青出於藍解密
- 循序漸進nginx(二):反向代理、負載均衡、快取服務、靜態資源訪問Nginx負載快取
- 循序漸進VUE+Element 前端應用開發(18)--- 功能點管理及許可權控制Vue前端
- 循序漸進體驗玩法和故事,從《八方旅人》談遊戲關卡設計遊戲
- 圖片漸進式載入最佳化實踐指南
- 漸進均分性(AEP)
- vuex 漸進式教程Vue
- 這樣進行進位制轉換更快更清晰哦!
- 漸進深入理解NginxNginx
- vuex 漸進式教程(一)Vue
- 漸進式渲染是什麼?
- Redis 漸進叢集介紹Redis
- 生鮮行業怎樣進行妥善的進銷存管理?行業
- 怎麼樣進行貨幣兌換?
- Photoshop教程_PS漸變工具找不到,怎樣匯入ps漸變樣式?ps漸變使用教程.
- win10怎麼進bios模式_win10怎樣進入bios設定Win10iOS模式
- canvas錐形漸變進度條Canvas