[ Pobierz całość w formacie PDF ]
.The Pentagon was hacked in 1983 by a 19-year-old Los Angelesstudent, Ronald Austin.Because of the techniques he used, a fullaccount is given in the operating systems section of chapter 6.NASA,the Space Agency, has also acknowledged that its e-mail system hasbeen breached and that messages and pictures of Kilroy were left asgraffiti.** Page 40This leaves only one outstanding mega-target, Platform, the globaldata network of 52 separate systems focused on the headquarters ofthe US's electronic spooks, the National Security Agency at FortMeade, Maryland.The network includes at least one Cray-1, the worldsmost powerful number-cruncher, and facilities provided by GCHQ atCheltenham.Although I know UK phone freaks who claim to have managed tofile:///E|/Books/Hackers Handbook.htm (39 of 133) [11/28/2000 5:58:49 AM]Hacker's Handbookappear on the internal exchanges used by Century House (M16) andCurzon Street House (M15) and have wandered along AUTOVON, the USsecure military phone network, I am not aware of anyone bold orclever enough to have penetrated the UK's most secure computers.It must be acknowledged that in general it is far easier to obtainthe information held on these machines--and lesser ones like the DVLC(vehicle licensing) and PNC (Police National Computer)-- by criminalmeans than by hacking -- bribery, trickery or blackmail, for example.Nevertheless, there is an interesting hacker's exercise indemonstrating how far it is possible to produce details from opensources of these systems, even when the details are supposed to besecret.But this relates to one of the hacker's own secretweapons--thorough research, the subject of the next chapter.** Page 41CHAPTER 5Hackers' IntelligenceOf all the features of hacking that mystify outsiders, the firstis how the hackers get the phone numbers that give access to thecomputer systems, and the passwords that open the data.Of all theways in which hacking is portrayed in films, books and tv, the mostmisleading is the concentration on the image of the solitary geniusbashing away at a keyboard trying to 'break in'.It is now time to reveal one of the dirty secrets of hacking:there are really two sorts of hacker.For this purpose I will callthem the trivial and the dedicated.Anyone can become a trivialhacker: you acquire, from someone else, a phone number and a passwordto a system; you dial up, wait for the whistle, tap out the password,browse around for a few minutes and log off.You've had some fun,perhaps, but you haven't really done anything except follow awell-marked path.Most unauthorised computer invasions are actuallyof this sort.The dedicated hacker, by contrast, makes his or her owndiscoveries, or builds on those of other pioneers.The motto ofdedicated hackers is modified directly from a celebrated splitinfinitive: to boldly pass where no man has hacked before.Successful hacking depends on good research.The materials ofresearch are all around: as well as direct hacker-oriented materialof the sort found on bulletin board systems and heard in quietcorners during refreshment breaks at computer clubs, huge quantitiesof useful literature are published daily by the marketing departmentsof computer companies and given away to all comers: sheaves ofstationery and lorry loads of internal documentation containingimportant clues are left around to be picked up.It is up to thehacker to recognise this treasure for what it is, and to assemble itfile:///E|/Books/Hackers Handbook.htm (40 of 133) [11/28/2000 5:58:49 AM]Hacker's Handbookin a form in which it can be used.Anyone who has ever done any intelligence work, not necessarilyfor a government, but for a company, or who has worked as aninvestigative journalist, will tell you that easily 90% of theinformation you want is freely available and that the difficult partis recognising and analysing it
[ Pobierz całość w formacie PDF ]