|
Hacking Menu |
||||
| rules | notes WWWBoard | beginer | math teory | net password |
| unix pass | ISP Pass | Web Pages | NT Passwd | PC Hacking FAQ |
|
Crack Menu |
||||
| crack faq | inside crack | Crack mail | TakeoverChan/nick | Program Files |
Written By George Patton
Inside Crack's
Introduction
“Think what your enemy will do and beat him to the draw” – George Patton
As security specialists we are constantly faced with new threats in the form of
malicious code,
denial of service attacks and the like. There is always a reason for the
Security Officer to get
up in the morning, as well as lock the “doors” at night. For better or worse,
the career
opportunities for both “black hats” and “white hats” show no sign of slowing
down. Just the
opposite. New tools to combat cyber crime are being marketed to IT professionals
like tofu-pups
at a PETA gathering. While paranoia and Black Ice become a way of life, it is
important to
understand the psychology and motivation of the cracker.
First. we need to understand the terminology. Hackers and hacking are sometimes
used synonymously
with crackers and their deeds. However, there are technically two different
profiles:
Profile of a hacker
Hackers generally like to think of themselves as an elite group of information
seekers who are
adept at exploring computer systems and networks. Although hacking into network
computer systems
is illegal, hackers believe it is ethically acceptable as long as a hacker does
not commit theft,
vandalism or breach any confidentiality -- the so-called hacker code of ethics.
In fact, many
hackers believe it is their responsibility to seek out security holes in
computer networks so
that systems administrators may fix them. "If we can share what we've learned
with everybody
and then publish it," L0pht hacker Wedge stated in a NewsHour interview, "
that's great." (1)
Profile of a cracker
But not all hackers follow a code of ethics. Those who break into computer
systems with
malicious intent are known in the hacking world as crackers. The word itself was
devised
by hackers who wanted to differentiate themselves from crackers. Whereas hackers
possess a
great deal of knowledge of computers and generally write their own hacking
programs, crackers
tend to be young and unskilled.
As Jeff Schiller, head of network security at M.I.T stated, "most of the
crackers we are
dealing with are not experts, they are not very sophisticated." (1) They do most
of their
cracking by downloading free hacking software from hacker Web sites. Although
they lack the
technical skills of hackers, crackers are considered dangerous because of their
irresponsible
use of sophisticated software.
Eric Raymond, author of “The New Hacker's Dictionary,” argues, “Real hackers
call these people
‘crackers’ and want nothing to do with them... being able to break security
doesn’t make you a
hacker any more than being able to hot wire cars makes you an automotive
engineer. Unfortunately,
many journalists and writers have been fooled into using the word ‘hacker’ to
describe
crackers; this irritates real hackers no end... “(2)
The motivation of Crackers/Hackers
Whether its described as a hack or a crack, lets look at some of the categories
of malicious
behavior: and don`t you must thinks first why you crack. I hope you not think
the crack is for fun.
Script Kiddies
Many believe that crack attacks on computer networks are the work of
sophisticated
hacker/crackers who spend hours writing complicated code and meticulously
probing a target
computer for a security hole to breech. Much to the surprise of most people, the
typical network
cracker is a 12-16 year old boy who found some cracking code on the Internet and
decided to try
it out. What makes the script kiddie so dangerous is not the vast amount of
knowledge that they
possess, but rather their lack of knowledge. Often a script kiddie will run a
script on a system
without having any understanding at all of what he or she is doing.
In the hacker/cracker community a script kiddie is considered to be at the
shallow end of the
gene pool. Their motivation is not based on showing off their own hard work but
rather causing
chaos with scripts they can steal or find on the internet.
Political Hacks/Cracks
On Tuedsay, November 7, 2000, the official Republican party Website was cracked
and it's normal
content was replaced by a rant on why you should vote for Al Gore. The Website
defacement was
noted at 4:00 AM EST and was not restored until after 9:00 AM EST. Keynote
systems, a firm that
monitors high profile and special events Web sites for performance, noticed the
crack after
their monitors showed a significant slowdown at the GOP.org Website.
This attack is being called by security experts an "articulate" attack. Unlike
many Web
defacements and other cracks and attacks, no one has claimed responsibility for
this attack.
Most cracks that come from script kiddies are less sophisticated and mature and
most of the time
the attack is immediately claimed by one cracker group or another. This was a
form of hacktivism,
or a computer hack with activist overtones, which is covered latter in this
discussion.
The Democratic National Committee Website was also attacked early election day
morning. In
contrast to the GOP attack, there was no defacement. This was a DoS attack or
Denial of Service
attack. According to a Democratic National Committee spokesman the DNC Web site
suffered
"...repeated attacks" until it was forced to shut down. (3)
Hacktivism
Hacktivism put crackers in a whole new category. While the script-kiddie is
causing mayhem with
trojan horses, worms, DOS attacks and web defacement for no other reason than a
personal “fix”,
Hacktivism is cracking with a political or activist mission. It is know as
electronic civil
disobedience. The future battle ground for political and social movements
including acts of
global terrorism may very well be the internet. As we becomes more
cyber-dependent, we also
become more venerable to malicious code.
One of the most celebrated and talked about acts of hacktivism is when the NY
Times site was
defaced by the group that called themselves HFG or Hacking For Girliez. On
September 13th, 1998
at 4:50 AM, the NY Times home page was replaced with a page created by HFG. This
act was aimed
primarily at the NY Times reporter John Markoff who co-authored the book "Take
Down". It is this
book that chronicled the exploits and eventual arrest of Kevin Mitnick. This act
of hacktivism
received a flurry of press coverage because it was one of the first attacks on a
mainstream
publishing company that had political overtones. (3)
Psychology of the Cracker
As documented by Marc Rogers M.A., Graduate Studies, Dept. of Psychology
University of
Manitoba(4), there are basically seven psychological profiles of crackers or
malicious hackers:
Tool kit/newbies (NT), cyber-punks (CP), internals (IT), coders (CD), old guard
hackers (OG),
professional criminals (PC), and cyber-terrorists (CT). These categories are
seen as comprising
a continuum from lowest technical ability (NT), to highest (OG-CT) .
The NT category includes those persons who have limited computer and programming
skills. These
persons are new to hacking and rely on already written pieces of software,
referred to as tool
kits, to conduct their attacks. The tool kits are readily available on the
Internet.
The CP category is compromised of persons who usually have better computer
skills and some
programming capabilities. They are capable of writing some of their own software
albeit limited
and have a better understanding of the systems they are attacking. They also
intentionally
engage in malicious acts, such as defacing web pages, and sending junk mail
(known as spamming).
Many are engaged in credit card number theft and telecommunications fraud.
IT can be made up of disgruntled employees or ex-employees who are usually very
computer
literate and much of the time work in computer releated jobs. They are able to
carry out their
attacks due to the privileges they have been or had been assigned as part of
their job function.
This group accounts for nearly 70% of all computer related criminal activity
(Power, 1997).(4)
The OG, appear to have no criminal intent although there is an alarming
disrespect for personal
property. The OG appears to be interested in the intellectual endeavor.
The PC and CT groups are probably the most dangerous. They are professional
criminals and
ex-intelligence operatives who are guns for hire. They specialize in corporate
espionage, are
usually extremely well trained, and have access to state of the art equipment.
It has been
theorized that the professional category has expanded since the dissolution of
several of the
eastern block intelligence agencies.
It seems the majority of research has been done on the CP category. They
Cyber-punk is probably
the most well known in hack/crack discussions and their actions may be the most
preventable as
attention is brought to discovering and addressing this behavior early on.
Therefore I have
included in this document the results of Marc Rogers research on the
psychological profile of
this offender…
“The available data indicates that individuals classified as CP are; Caucasian,
12-28 years,
from middle class families. They are loners, who have limited social skills and
perform poorly
in school (Chandler, 1996; Littman 1996; Hafner & Markoff, 1995; Sperling,
1992). They are
usually not career oriented, but show an aptitude with computers and other
electronic equipment.
Their families are usually considered dysfunctional, single parent, abusive, and
in some cases
sexually abusive (Goodell, 1995). Often these individuals display obsessive
traits, staying
online for days on end with no sleep (Goodell, 1995). Cyber-punks have a
tendency to brag about
their exploits. This may be due in part to their desire to be admired by their
hacking peers
(Post, 1996; Sperling, 1992). The bragging often results in them coming to the
attention of law
enforcement. The bragging and willingness to talk about their exploits continues
even while in
custody and during interviews with law enforcement (Hafner & Markoff, 1995;
Littman, 1995).The
fact that many of the attacks are malicious in nature suggests that these
individuals have
unresolved anger and feel a need to strike out at something or someone (Post,
1996; Sperling,
1992). They are not comfortable with people so they strike out at computers and
networks,
rationalizing that corporations are immoral and need to be taught a lesson
(Post, 1996).”(4)
John Vranesevich, founder of AntiOnline, describes the CP in this way, “I often
refer to this
group as my 'gang mentality' group. If these people weren't breaking into
computer systems,
they'd be out on the streets trying to spray paint their initials on the tallest
buildings they
could get their hands on. They hack to try to gain peer acceptance, a feeling of
self-superiority
, or a feeling of control," (5)
- = - = -
= - = - = - = - = - = - = - = - = - = - = - = -
StopWar
Contact information:
Email - MohamadAzmie@Hotmail.Com
Http:// - MasterZCrew.Cjb.Net & HackerMasterZ.Cjb.Net
- = - = - = - = - = - = - = - = - = - == - = - = - = - = -
Copyrighted (C) 2002
by StopWar All rights Reserved MasterZCrew, Inc.