712 lines
30 KiB
Plaintext
712 lines
30 KiB
Plaintext
|
|
Computer underground Digest Sun July 26, 1998 Volume 10 : Issue 41
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.41 (Sun, July 26, 1998)
|
|
|
|
File 1--Groups Write Senate on Pending Net Censorship Bills (EPIC)
|
|
File 2--Joint Letter to USSentate IN RE S-1619 and S-1482
|
|
File 3--Followup to Rutstein review
|
|
File 4--Re: [Secure-NT] Followup to Rutstein review
|
|
File 5--Microsoft, Netscape, & Diversity
|
|
File 6--cDc releases BACK ORIFICE for MS Windows
|
|
File 7--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Mon, 20 Jul 1998 18:18:18 -0400
|
|
From: EPIC-News List <epic-news@epic.org>
|
|
Subject: File 1--Groups Write Senate on Pending Net Censorship Bills (EPIC)
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
http://www.epic.org
|
|
|
|
[1] Groups Write Senate on Pending Net Censorship Bills
|
|
|
|
EPIC joined with a dozen other free speech and civil liberties
|
|
groups on July 14 in a letter sent to the U.S. Senate concerning
|
|
two pending Internet censorship bills, saying they violate the
|
|
First Amendment. The groups contend that the bills -- one
|
|
requiring Internet content filters and the other setting criminal
|
|
penalties for providing "inappropriate" online material to minors)
|
|
-- would severely restrict free expression on the Internet.
|
|
|
|
The Senate may soon vote on both bills. Sen. John McCain's
|
|
"Internet School Filtering Act" (S. 1619) would require schools
|
|
and libraries receiving federal Internet subsidies to install
|
|
filtering software designed to prevent children from accessing
|
|
"inappropriate" material. Sen. Dan Coats' bill (S. 1482) would
|
|
criminalize the "commercial" distribution on websites of material
|
|
that is "harmful to minors." The Coats bill, in adopting a
|
|
criminalization approach to online content, is similar to the
|
|
Communications Decency Act (CDA) struck down last year by the
|
|
Supreme Court. The bill, which has been dubbed "CDA II," could
|
|
come to the Senate floor as early as this week.
|
|
|
|
"One year ago, the Supreme Court unanimously ruled that the
|
|
Communications Decency Act of 1996, which made it a crime to
|
|
transmit 'indecent' materials on the Internet, violated the First
|
|
Amendment," the coalition letter states. "The two pending bills
|
|
ignore the central holding of the Court; expression on the
|
|
Internet is entitled to the highest degree of First Amendment
|
|
protection.
|
|
|
|
"We share the concern of Sens. McCain and Coats that the Internet
|
|
remain a safe and rewarding medium for young people," the letter
|
|
continues. "However, we strongly believe that these bills embrace
|
|
approaches --filtering and criminalization -- that are both
|
|
constitutionally suspect and ultimately ineffective in providing
|
|
our children with positive online experiences."
|
|
|
|
EPIC is supporting an online campaign to raise Congressional
|
|
awareness of the implications of these Internet censorship bills.
|
|
Faxes can be sent --free of charge -- to your Senators by visiting
|
|
the EPIC Free Speech Action page:
|
|
|
|
http://www.epic.org/free_speech/action/
|
|
|
|
If you sent faxes to the Senate earlier, you helped keep these
|
|
bills off the floor. Please reiterate your concerns once again
|
|
and let your Senators know that these measures remain
|
|
controversial.
|
|
|
|
The text of the coalition letter to the Senate is available at the
|
|
Internet Free Expression Alliance website:
|
|
|
|
http://www.ifea.net/joint_ltr_7_14.html
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 26 Jul 1998 11:52:05 -0500
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 2--Joint Letter to USSentate IN RE S-1619 and S-1482
|
|
|
|
INTERNET FREE EXPRESSION ALLIANCE
|
|
|
|
INTERNET FREE EXPRESSION ALLIANCE
|
|
|
|
|
|
JOINT LETTER TO THE UNITED STATES SENATE
|
|
|
|
|
|
|
|
July 14, 1998
|
|
|
|
Re: S. 1619 and S. 1482
|
|
|
|
Dear Senator:
|
|
|
|
We are writing on behalf of the undersigned organizations to express
|
|
our concerns about two bills that would restrict free expression on
|
|
the Internet -- S. 1619 and S. 1482. We understand that both of
|
|
these bills may soon be considered by the Senate.
|
|
|
|
One year ago, the Supreme Court unanimously ruled that the
|
|
Communications Decency Act of 1996, which made it a crime to
|
|
transmit "indecent" materials on the Internet, violated the First
|
|
Amendment. The two pending bills ignore the central holding of the
|
|
Court; expression on the Internet is entitled to the highest degree
|
|
of First Amendment protection. The Internet School Filtering Act (S.
|
|
1619), sponsored by Senator McCain, would require that all public
|
|
libraries and schools that receive federal funds for Internet access
|
|
install blocking software to restrict minors' access to
|
|
"inappropriate" material. S. 1482, sponsored by Senator Coats, would
|
|
punish commercial online distributors of material deemed "harmful to
|
|
minors" with up to six months in jail and a $50,000 fine.
|
|
|
|
We share the concern of Sens. McCain and Coats that the Internet
|
|
remain a safe and rewarding medium for young people. However, we
|
|
strongly believe that these bills embrace approaches -- filtering
|
|
and criminalization -- that are both constitutionally suspect and
|
|
ultimately ineffective in providing our children with positive
|
|
online experiences. As such, we urge you to consider a better
|
|
approach to this issue, one that would encourage the development of
|
|
"Internet drivers' education" programs of the kind being
|
|
successfully employed in communities throughout the nation. These
|
|
programs may effectively supplement policies that limit Internet use
|
|
to educational and curricular purposes. Individual school districts
|
|
that find them useful currently are free to adopt such educational
|
|
use policies, even without specific legislation.
|
|
|
|
We urge you to consider this alternative approach because we believe
|
|
that parents and teachers -- not the federal government -- should
|
|
provide our children with guidance about accessing information on
|
|
the Internet. Clumsy and ineffective blocking programs are "quick
|
|
fix" solutions to parental concerns that provide a false sense of
|
|
security that minors will be protected from all material that
|
|
parents may find inappropriate. At the same time, filtering software
|
|
restricts access to valuable, constitutionally protected online
|
|
speech about topics ranging from safe sex, AIDS, gay and lesbian
|
|
issues, news articles, and women's rights. Religious groups such as
|
|
the Society of Friends and the Glide United Methodist Church have
|
|
been blocked by these imperfect censorship tools, as have policy
|
|
groups like the American Family Association. This type of arbitrary
|
|
censorship is a blatant violation of the First Amendment.
|
|
|
|
S. 1482 should be rejected because it contains many of the
|
|
unconstitutional provisions of the Communications Decency Act that
|
|
were unanimously overturned by the Supreme Court in Reno v. ACLU.
|
|
Like the CDA, S. 1482 would have the effect of criminalizing
|
|
protected speech among adults. Whatever governmental interest may
|
|
exist to protect children from harmful materials, that interest does
|
|
not justify the broad suppression of adult speech. While the bill is
|
|
ostensibly aimed at "commercial" web sites, that term is so broad
|
|
that it covers anything from an on-line book seller like Amazon.com
|
|
to a non-profit website that sells books or T-shirts.
|
|
|
|
The age verification affirmative defense of S. 1482 -- which
|
|
precisely duplicates the CDA's defense -- ignores the finding in
|
|
Reno v. ACLU that there simply is no way to verify age on the
|
|
Internet. As the Supreme Court noted, the vast majority of websites
|
|
are not financially or technically capable of requiring a credit
|
|
card or other form of identification to verify the age of users. The
|
|
government may not mandate the application of a legal standard to
|
|
the Internet -- whether it be "indecency" or speech that is "harmful
|
|
to minors" -- that requires speakers to distinguish between adults
|
|
and minors when such a distinction cannot be made.
|
|
|
|
Finally, S. 1482 will not be effective in keeping from minors
|
|
material that might be inappropriate for them. No criminal provision
|
|
will be more effective than efforts to educate parents and minors
|
|
about Internet safety and how to properly use online resources.
|
|
Moreover, the Internet is a global medium. Despite all the
|
|
enforcement efforts that might be made, a national censorship law
|
|
cannot protect children from online content they will always be able
|
|
to access from foreign sources.
|
|
|
|
For the foregoing reasons we urge you to oppose S. 1619 and S. 1482
|
|
and any other efforts to dilute the potential of this powerful
|
|
medium. We hope you will agree with our view that an educational
|
|
approach, as opposed to filtering requirements and new criminal
|
|
laws, is the best way to address the issue of how our children use
|
|
the Internet.
|
|
|
|
|
|
|
|
Sincerely,
|
|
|
|
|
|
|
|
Christopher Finan
|
|
President
|
|
American Booksellers Foundation for Free Expression
|
|
|
|
Laura W. Murphy
|
|
Washington Office Director
|
|
American Civil Liberties Union
|
|
|
|
Aki Namioka
|
|
President
|
|
Computer Professionals for Social Responsibility
|
|
|
|
Barry Steinhardt
|
|
President
|
|
Electronic Frontier Foundation
|
|
|
|
David L. Sobel
|
|
General Counsel
|
|
Electronic Privacy Information Center
|
|
|
|
Joan M. Garry
|
|
Executive Director
|
|
Gay & Lesbian Alliance Against Defamation
|
|
|
|
Nina Crowley
|
|
Director
|
|
Massachusetts Music Industry Coalition
|
|
|
|
David Greene
|
|
Program Director
|
|
National Campaign for Freedom of Expression
|
|
|
|
Joan Bertin
|
|
Executive Director
|
|
National Coalition Against Censorship
|
|
|
|
Audrie Krause
|
|
Executive Director
|
|
NetAction
|
|
|
|
Bennett Haselton
|
|
Co-ordinator
|
|
Peacefire
|
|
|
|
Diana Ayton-Shenker
|
|
Director, Freedom-to-Write
|
|
PEN American Center
|
|
|
|
Carole Shields
|
|
President
|
|
People For the American Way
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 22 Jul 1998 15:34:53 -0700 (PDT)
|
|
From: Mike Godwin <mnemonic@well.com>
|
|
Subject--[correction] EFF's Barry Steinhardt on Senate's Internet
|
|
|
|
Date--Wed, 22 Jul 1998 15:45:42 -0500
|
|
From--Daniel Weitzner <djw@cdt.org
|
|
|
|
At 12:34 PM -0500 7/22/98, Dave Farber wrote:
|
|
FOR IMMEDIATE RELEASE
|
|
July 21, 1998
|
|
|
|
CONTACTS:
|
|
Barry Steinhardt, EFF President, 212 549 2508, E-mail barrys@eff.org
|
|
Alexander Fowler, EFF Director of Public Affairs, 202 462 5826,
|
|
E-mail afowler@eff.org
|
|
|
|
ELECTRONIC FRONTIER FOUNDATION REACTS TO SENATE PASSAGE OF TWO INTERNET
|
|
FILTERING BILLS
|
|
|
|
|
|
Statement of Barry Steinhardt
|
|
President of the Electronic Frontier Foundation
|
|
|
|
This afternoon the Senate passed two draconian bills that would
|
|
ultimately prevent access to a wide array of content on the
|
|
Internet.
|
|
|
|
I don't mean to rain on EFF's parade, but they have mistakenly
|
|
reported that CDA II passed the Senate when, in fact, it has not.
|
|
Senator Coats' CDA II and Sen. McCain's School/Library filtering
|
|
act were both attached to an appropriations bill, but that bill
|
|
has not yet passed the Senate. Moreover, pro-free speech forces
|
|
should be aware that there are a number of additional steps in
|
|
the legislative process before final passage and Presidential
|
|
signature of these bill. So, there's still time to express your
|
|
opinion to your elected representatives. They bill could pass
|
|
today, tomorrow, or never, but it's still important to
|
|
|
|
EFF is not alone in its confusion about this legislative process.
|
|
Several press outlets also reported that the bills passed. The
|
|
source of confusion appears to be a press release put out by the
|
|
bill's sponsor (Senator Coats) declaring victory in the Senate a
|
|
bit early.
|
|
|
|
======================================================================
|
|
Daniel J. Weitzner, Deputy Director djw@cdt.org
|
|
Center for Democracy and Technology +1 202.637.9800 (v)
|
|
1634 'Eye' St., NW Suite 1100 +1 202.637.0968 (f)
|
|
Washington, DC 20006 USA http://www.cdt.org/
|
|
PGP-Encrypted mail welcomed
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 Jul 1998 13:19:38 -0800
|
|
From: "Rob Slade" <rslade@sprint.ca>
|
|
Subject: File 3--Followup to Rutstein review
|
|
|
|
Boy, did *this* ever open a can of worms! I cannot recall any
|
|
review that has generated this much response, this fast.
|
|
|
|
Sorry to those who did not get a personal response, and thanks to
|
|
the majority of you for your kind words about the reviews, but
|
|
there were just too many of you, mostly asking the same question.
|
|
Almost all of you wanted to know of an NT security book that I
|
|
could recommend.
|
|
|
|
Well, I am sorry to disappoint you, but *I'd* like to know of an
|
|
NT security book that I could recommend. I haven't found one yet.
|
|
(For those incipient authors who are experts in the field, and
|
|
have about a year to give to the task, there is an apparent market
|
|
niche.)
|
|
|
|
The reason for this lack may lie in a number of areas. As one
|
|
correspondent implied, many think that "NT security" is an
|
|
oxymoron. I note that while there are a variety of NT security
|
|
resources out there, and there have been a few attempts to start
|
|
one, there is no really good NT security FAQ available yet. There
|
|
are a number of sites with exploit information, and there is one
|
|
vendor that tries to sell you an NT security file, but the closest
|
|
I've seen to a good FAQ was a recent "top ten" list of things to
|
|
do to make NT marginally more secure than it is when it ships.
|
|
|
|
I suspect that part of the problem lies in the design of NT
|
|
itself, which does not make security provisions straightforward to
|
|
implement, but it may also be simply bad luck in the selection of
|
|
authors who have attempted to address the issue so far. Of the
|
|
number of NT security books I've reviewed to date, I still haven't
|
|
found a definitely good one, let alone anything to the standard of
|
|
Spafford and Garfinkel.
|
|
|
|
Just to reiterate, here are the titles I've reviewed so far:
|
|
|
|
<p><a href="bkpwntsg.rvw"> "PCWeek Microsoft Windows NT
|
|
Security"</a>, Nevin Lambert/Manish Patel, 1997,
|
|
1-56276-457-8, U$39.99/C$56.95/UK#36.99 - good introductory
|
|
or non-specialist guide, but there are holes
|
|
|
|
<p><a href="bkwntscg.rvw"> "Windows NT Security Guide"</a>, Stephen
|
|
A. Sutton, 1997, 0-201-41969-6, U$29.95/C$41.00 - too vague
|
|
for users, lacking detail for administrators
|
|
|
|
<p><a href="bkwntsec.rvw"> "Windows NT Security"</a>, Charles B.
|
|
Rutstein, 1997, 0-07-057833-8, U$34.95 - reasonable range,
|
|
but has gaps and lacks analysis
|
|
|
|
Normally, if I were recommending texts on security in the UNIX
|
|
field, I would also include works on system administration.
|
|
However, in the NT arena, while some admin authors have tried to
|
|
cover the topic it is just too big to handle as a subsection of a
|
|
larger work.
|
|
|
|
======================
|
|
rslade@sprint.ca rslade@vcn.bc.ca robertslade@usa.net
|
|
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
|
|
"Robert Slade's Guide to Computer Viruses" 0-387-94663-2 800-SPRINGER
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 24 Jul 1998 09:32:58 -0400
|
|
From: David LeBlanc <dleblanc@mindspring.com>
|
|
Subject: File 4--Re: [Secure-NT] Followup to Rutstein review
|
|
|
|
At 01:19 PM 7/23/98 -0800, Rob Slade wrote:
|
|
>Almost all of you wanted to know of an NT
|
|
>security book that I could recommend.
|
|
|
|
>Well, I am sorry to disappoint you, but *I'd* like to know of an NT security
|
|
>book that I could recommend. I haven't found one yet.
|
|
|
|
I have to differ. I've found the reviews you've done of both Rutstein and
|
|
Sutton's books to be hypercritical. Both of those books are resources that
|
|
I find valuable. I personally recommend both of them, as well as Mark
|
|
Edward's book. If I were to give someone an NT security reading list, I'd
|
|
start with those three, add the NT Resource Kit, and the help system to
|
|
ISS' Internet Scanner for Windows NT.
|
|
|
|
As someone who lives and breathes NT security (and has for about 4 years),
|
|
and who has been approached to write a book on the topic, I'd like to think
|
|
I'm familiar with this area and would be a decent judge of the existing
|
|
material. I'd also note that Jim Kelly (architect of NT's security
|
|
subsystem, and author of the security reference monitor) had some very good
|
|
words to say about Rutstein's book. I know Jim and have a lot of respect
|
|
for him and his opinion.
|
|
|
|
>The reason for this lack may lie in a number of areas. As one correspondent
|
|
>implied, many think that "NT security" is an oxymoron.
|
|
|
|
Nice joke, but any professional in the field understands that perfect
|
|
security cannot be obtained. We've got a difficult job to do trying to
|
|
secure networks, and there are significant challenges securing _any_
|
|
operating system.
|
|
|
|
>I note that while there
|
|
>are a variety of NT security resources out there, and there have been a few
|
|
>attempts to start one, there is no really good NT security FAQ available
|
|
yet.
|
|
|
|
You may be missing Robert Malgrem's FAQ. Sutton's NSA paper isn't a FAQ,
|
|
but is the clearest, most comprehensive and up-to-date information
|
|
available on what to secure and how to secure it. I can find very, very
|
|
few things I feel he's left out and little I can argue with.
|
|
|
|
>There are a number of sites with exploit information, and there is one vendor
|
|
>that tries to sell you an NT security file, but the closest I've seen to a
|
|
good
|
|
>FAQ was a recent "top ten" list of things to do to make NT marginally more
|
|
>secure than it is when it ships.
|
|
|
|
Then you should read Sutton's paper. It could be that you're not aware of
|
|
all the resources.
|
|
|
|
>Of the number of NT security books I've reviewed to date, I still
|
|
>haven't found a definitely good one, let alone anything to the standard of
|
|
>Spafford and Garfinkel.
|
|
|
|
Let's not lose sight of another fact - Spafford and Garfinkel was first
|
|
published in 1991. That is nearly 25 years after UNIX was invented. I
|
|
would certainly hope that we will accumulate a well-defined body of
|
|
knowledge on NT security in the next 20 years. A comparison of a book
|
|
based on 3-4 years of experience to a book based on over 25 years (current
|
|
edition) is going to be flawed - you're talking apples and oranges.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 22 Jul 1998 13:31:03 -0700 (PDT)
|
|
From: David Batterson <davidbat@yahoo.com>
|
|
Subject: File 5--Microsoft, Netscape, & Diversity
|
|
|
|
Browser-Enemies Microsoft and Netscape Are
|
|
Kindred Spirits Regarding Employee Diversity
|
|
by David Batterson
|
|
|
|
|
|
There are gay-friendly computer companies, and those that only
|
|
pretend to be. Let's separate the wheat from the chaff. If a company
|
|
isn't gay-friendly with its employees, do you want to buy from them?
|
|
|
|
A few of the many gay-friendly computer corporations (A-Z) are
|
|
Adobe Systems, Aldus, Apple Computer, AOL, Dell, Egghead, IBM,
|
|
Gateway, Lucent Technologies, NEC America, Oracle, Qualcomm, Seagate
|
|
Technology, Texas Instruments, US Robotics (now part of 3COM), Xerox
|
|
and Ziff-Davis.
|
|
|
|
Two companies are currently fighting a fierce browser-battle
|
|
that makes the Bette Davis v. Joan Crawford spats look like ballroom
|
|
dancing. While many favor Netscape's browser, that's not the issue
|
|
today.
|
|
|
|
What the focus is: are these companies a great place for those in the
|
|
GLBT community to work? The answer in both case is: definitely.
|
|
Both offer domestic partnership benefits, natch, and much more.
|
|
|
|
Microsoft has a huge commitment to diversity, and also devotes a
|
|
large Web section to it: www.microsoft.com/diversity/default.htm.
|
|
|
|
Microsoft currently offers two interactive diversity training
|
|
programs. The "Diversity Awareness" program is an introduction to
|
|
diversity. The program "focuses on reducing the image and influence
|
|
of stereotypes, identify elements that make each participant a
|
|
diverse person, and share communication strategies that help
|
|
participants in a diverse environment."
|
|
|
|
The company also has a variety of internal initiatives, including
|
|
an intranet site (internal to Microsoft employees only) called
|
|
"DiversityNet" where employees can find information vital to the
|
|
company's diversity efforts.
|
|
|
|
If you have any questions/comments about diversity at Microsoft or
|
|
their Diversity Web site, e-mail them at: diverse@microsoft.com.
|
|
GLBT job candidates are encouraged to submit resumes directly to:
|
|
Jobseek@microsoft.com.
|
|
|
|
While Netscape's diversity section in their corporate Web site is
|
|
not as elaborate as Microsoft's, it shows their true colors. Surf to:
|
|
home.netscape.com/comprod/about_netscape/hr/diversity/index.html.
|
|
Or just go to their main Web site, and search under "Jobs."
|
|
|
|
Netscape's diversity statement says: "Netscape is committed to
|
|
hiring the brightest and the best, and we execute this philosophy
|
|
without regard to race, color, creed, religion, national origin,
|
|
sexual orientation (perceived or otherwise), age, sex, or
|
|
disability."
|
|
|
|
It goes on: "Diversity in our work environment is not simply
|
|
something Netscape values, we strive for it. Project DIVA (Diversity
|
|
Involves Valuing All) is a four-step process conceived to actively
|
|
pursue the goal of cultural diversity within the company."
|
|
|
|
Netscape also has a program that works with university programs and
|
|
community organizations to increase the diversity of their applicant
|
|
pool. E-mail them for more info: diversity@netscape.com.
|
|
|
|
So there you have it. In the diversity competition between
|
|
Microsoft and Netscape, you'd have to call it a draw (and that's good
|
|
for us). If you work for either company (or know those who do), your
|
|
feedback is welcomed.
|
|
|
|
------------
|
|
Send comments to davidbat@yahoo.com. Copyright 1998, All Rights
|
|
Reserved. May not be reprinted without permission.
|
|
------------
|
|
David Batterson has written for gay papers (B.A.R., Just Out, Bay
|
|
Windows, The Texas Triangle, The Weekly News), as well as regional
|
|
and national computer publications.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 24 Jul 1998 18:47:33 -0700 (PDT)
|
|
From: editor@cultdeadcow.com
|
|
Subject: File 6--cDc releases BACK ORIFICE for MS Windows
|
|
|
|
|
|
RUNNING A MICROSOFT OPERATING SYSTEM ON A NETWORK? OUR CONDOLENCES.
|
|
|
|
[July 21, San Francisco] The CULT OF THE DEAD COW (cDc) will release Back
|
|
Orifice, a remote MS Windows Administration tool at Defcon VI in Las Vegas
|
|
(www.defcon.org) on August 1. Programmed by Sir Dystic [cDc], Back Orifice
|
|
is a self-contained, self-installing utility which allows the user to
|
|
control and monitor computers running the Windows operating system over a
|
|
network.
|
|
|
|
Sir Dystic sounded like an overworked sysadmin when he said, "The two main
|
|
legitimate purposes for BO are, remote tech support aid and employee
|
|
monitoring and administering [of a Windows network]."
|
|
|
|
Back Orifice is going to be made available to anyone who takes the time to
|
|
download it. So what does that mean for anyone who's bought into
|
|
Microsoft's Swiss cheese approach to security? Plenty according to
|
|
Mike Bloom, Chief Technical Officer for Gomi Media in Toronto.
|
|
|
|
"The current path of learning I see around me is to learn what you have to
|
|
to cover your ass, go home and watch Jerry. Microsoft has capitalized on
|
|
this at the cost of production value which translates down to security. A
|
|
move like releasing [Back Orifice] means that the lowest common
|
|
denominator of user will have to come to understand the threat, and that
|
|
it is not from [Sir Dystic] writing an app that [potentially] turns Win32
|
|
security on its ear, but that Microsoft has leveraged itself into a
|
|
position where anyone who wants to can download an app [or write their
|
|
own!] and learn a few tricks and make serious shit happen."
|
|
|
|
None of this is lost on Microsoft. But then again, they don't care.
|
|
Security is way down on their list of priorities according to security
|
|
expert Russ Cooper of NT BUGTRAQ (www.ntbugtraq.com). "Microsoft doesn't
|
|
care about security because I don't believe they think it affects their
|
|
profit. And honestly, it probably doesn't." Nice. But regardless of which
|
|
side of the firewall you sit on, you can't afford not to have a copy of
|
|
Back Orifice. Here are the specs:
|
|
|
|
|
|
Back Orifice (BO) allows the user to remotely control almost all parts of
|
|
the operating system, including:
|
|
|
|
File system
|
|
Registry
|
|
System
|
|
Passwords
|
|
Network
|
|
Processes
|
|
|
|
* BO contains extensive multimedia control, allowing images to be captured
|
|
from the server machine's screen, or from any video input device attached
|
|
to the machine.
|
|
|
|
* BO has an integrated HTTP server, allowing uploads and downloads of
|
|
files to and from a machine on any port using any http client.
|
|
|
|
* BO has an integrated packet sniffer, allowing easy monitoring of network
|
|
traffic.
|
|
|
|
* BO has an integrated keyboard monitor, allowing the easy logging of
|
|
keystrokes to a log file.
|
|
|
|
* BO allows connection redirection, allowing connections to be bounced off
|
|
a machine to any other machine on the Internet.
|
|
|
|
* BO allows application redirection, allowing text based applications
|
|
running on the server machine to be controlled via a simple telnet
|
|
session. Even open a remote shell.
|
|
|
|
* BO has a simple plugin interface, allowing additional modules to be
|
|
written by third parties, and executed in Back Orifice's hidden system
|
|
process.
|
|
|
|
* BO is EASY TO INSTALL! Simply run the server, and it installs itself,
|
|
and removes the executable it was originally run from, or it can be
|
|
attached to any other Windows executable, which will run normally after
|
|
installing the Back Orifice server.
|
|
|
|
* BO is TRANSPARENT! Back Orifice does not show up in the task list, or
|
|
even the Close Programs dialog, it is automatically restarted each time
|
|
the computer boots, and does not affect the operation of any other
|
|
applications.
|
|
|
|
* BO is CONFIGURABLE! The filename that Back Orifice installs itself as,
|
|
the port Back Orifice communicates on, and the encryption key are all
|
|
configurable before the server is installed.
|
|
|
|
* BO is ENCRYPTED! Communication packets used by Back Orifice are
|
|
encrypted with a user definable key, so only the intended client can
|
|
control the server.
|
|
|
|
* BO is FREE! All the functionality mentioned above AND MORE is available
|
|
in the 120k server, along with an easy to use text based or GUI client,
|
|
Back Orifice comes with everything you need to distribute and control any
|
|
number of machines.
|
|
|
|
* BO is GROWING! New features, increased efficiency, new plugins, and
|
|
more support are being added to Back Orifice every day.
|
|
|
|
|
|
After August 3, Back Orifice will be available from www.cultdeadcow.com
|
|
free of charge.
|
|
|
|
For further details or lucrative film offers, please contact:
|
|
|
|
The Deth Vegetable
|
|
Minister of Propaganda
|
|
CULT OF THE DEAD COW
|
|
veggie@cultdeadcow.com
|
|
|
|
............................................................................
|
|
|
|
The CULT OF THE DEAD COW (cDc) is the most influential group of hackers in
|
|
the world. Formed in 1984, the cDc has done everything from publish the
|
|
longest running e-zine on the Internet to diddling military networks
|
|
around the globe. We could go on, but who's got the time. Journalists can
|
|
check out the Medialist link on our Web site for more background
|
|
information. Cheerio.
|
|
|
|
"cDc. It's alla'bout style, jackass."
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 Apr 1998 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
CuD is readily accessible from the Net:
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.41
|
|
************************************
|
|
|