Underground, Suelette Dreyfus [ebook reader online .txt] 📗
- Author: Suelette Dreyfus
- Performer: 1863305955
Book online «Underground, Suelette Dreyfus [ebook reader online .txt] 📗». Author Suelette Dreyfus
Back in 1987 or early 1988, Force had logged into Pacific Island for a talk with Craig Bowen. Force bemoaned the tediousness of hand scanning.
`Well, why the hell are you doing it manually?’ Bowen responded. `You should just use my program.’ He then gave Force the source code for his simple automated scanning program, along with instructions.
Force went through the program and decided it would serve as a good launchpad for bigger things, but it had a major limitation. The program could only handle one connection at a time, which meant it could only scan one branch of a network at a time.
Less than three months later, Force had rewritten Bowen’s program into the far more powerful DEFCON, which became the jewel in the crown of the Australian hackers’ reputation. With DEFCON, a hacker could automatically scan fifteen or twenty network addresses simultaneously. He could command the computer to map out pieces of the Belgian, British and Greek X.25 communications networks, looking for computers hanging off the networks like buds at the tips of tree branches.
Conceptually, the difference was a little like using a basic PC, which can only run one program at a time, as opposed to operating a more sophisticated one where you can open many windows with different programs running all at once. Even though you might only be working in one window, say, writing a letter, the computer might be doing calculations in a spreadsheet in another window in the background. You can swap between different functions, which are all running in the background simultaneously.
While DEFCON was busy scanning, Force could do other things, such as talk on Altos. He continued improving DEFCON, writing up to four more versions of the program. Before long, DEFCON didn’t just scan twenty different connections at one time; it also automatically tried to break into all the computers it found through those connections. Though the program only tried basic default passwords, it had a fair degree of success, since it could attack so many network addresses at once. Further, new sites and mini-networks were being added so quickly that security often fell by the wayside in the rush to join in. Since the addresses were unpublished, companies often felt this obscurity offered enough protection.
DEFCON produced lists of thousands of computer sites to raid. Force would leave it scanning from a hacked Prime computer, and a day or two later he would have an output file with 6000 addresses on different networks. He perused the list and selected sites which caught his attention. If his program had discovered an interesting address, he would travel over the X.25 network to the site and then try to break into the computer at that address. Alternatively, DEFCON might have already successfully penetrated the machine using a default password, in which case the address, account name and password would all be waiting for Force in the log file. He could just walk right in.
Everyone on Altos wanted DEFCON, but Force refused to hand over the program. No way was he going to have other hackers tearing up virgin networks. Not even Erik Bloodaxe, one of the leaders of the most prestigious American hacking group, Legion of Doom (LOD), got DEFCON when he asked for it. Erik took his handle from the name of a Viking king who ruled over the area now known as York, England. Although Erik was on friendly terms with the Australian hackers, Force remained adamant. He would not let the jewel out of his hands.
But on this fateful day in 1988, Par didn’t want DEFCON. He wanted the secret Force had just discovered, but held so very close to his chest. And the Australian didn’t want to give it to him.
Force was a meticulous hacker. His bedroom was remarkably tidy, for a hacker’s room. It had a polished, spartan quality. There were a few well-placed pieces of minimalist furniture: a black enamel metal single bed, a modern black bedside table and a single picture on the wall—a photographic poster of lightning, framed in glass. The largest piece of furniture was a blue-grey desk with a return, upon which sat his computer, a printer and an immaculate pile of print-outs. The bookcase, a tall modern piece matching the rest of the furniture, contained an extensive collection of fantasy fiction books, including what seemed to be almost everything ever written by David Eddings. The lower shelves housed assorted chemistry and programming books. A chemistry award proudly jutted out from the shelf housing a few Dungeons and Dragons books.
He kept his hacking notes in an orderly set of plastic folders, all filed in the bottom of his bookcase. Each page of notes, neatly printed and surrounded by small, tidy handwriting revealing updates and minor corrections, had its own plastic cover to prevent smudges or stains.
Force thought it was inefficient to hand out his DEFCON program and have ten people scan the same network ten different times. It wasted time and resources. Further, it was becoming harder to get access to the main X.25 sites in Australia, like Minerva. Scanning was the type of activity likely to draw the attention of a system admin and result in the account being killed. The more people who scanned, the more accounts would be killed, and the less access the Australian hackers would have. So Force refused to hand over DEFCON to hackers outside The Realm, which is one thing that made it such a powerful group.
Scanning with DEFCON meant using Netlink, a program which legitimate users didn’t often employ. In his hunt for hackers, an admin might look for people running Netlink, or he might just examine which systems a user was connecting to. For example, if a hacker connected directly to Altos from Minerva without hopping through a respectable midpoint, such as another corporate machine overseas, he could count on the Minerva admins killing off the account.
DEFCON was revolutionary for its time, and difficult to reproduce. It was written for Prime computers, and not many hackers knew how to write programs for Primes. In fact, it was exceedingly difficult for most hackers to learn programming of any sort for large, commercial machines. Getting the system engineering manuals was tough work and many of the large companies guarded their manuals almost as trade secrets. Sure, if you bought a $100000 system, the company would give you a few sets of operating manuals, but that was well beyond the reach of a teenage hacker. In general, information was hoarded—by the computer manufacturers, by the big companies which bought the systems, by the system administrators and even by the universities.
Learning on-line was slow and almost as difficult. Most hackers used 300 or 1200 baud modems. Virtually all access to these big, expensive machines was illegal. Every moment on-line was a risky proposition. High schools never had these sorts of expensive machines. Although many universities had systems, the administrators were usually miserly with time on-line for students. In most cases, students only got accounts on the big machines in their second year of computer science studies. Even then, student accounts were invariably on the university’s oldest, clunkiest machine. And if you weren’t a comp-sci student, forget it. Indulging your intellectual curiosity in VMS systems would never be anything more than a pipe dream.
Even if you did manage to overcome all the roadblocks and develop some programming experience in VMS systems, for example, you might only be able to access a small number of machines on any given network. The X.25 networks connected a large number of machines which used very different operating systems. Many, such as Primes, were not in the least bit intuitive. So if you knew VMS and you hit a Prime machine, well, that was pretty much it.
Unless, of course, you happened to belong to a clan of hackers like The Realm. Then you could call up the BBS and post a message. `Hey, I found a really cool Primos system at this address. Ran into problems trying to figure the parameters of the Netlink command. Ideas anyone?’ And someone from your team would step forward to help.
In The Realm, Force tried to assemble a diverse group of Australia’s best hackers, each with a different area of expertise. And he happened to be the resident expert in Prime computers.
Although Force wouldn’t give DEFCON to anyone outside The Realm, he wasn’t unreasonable. If you weren’t in the system but you had an interesting network you wanted mapped, he would scan it for you. Force referred to scans for network user addresses as `NUA sprints’. He would give you a copy of the NUA sprint. While he was at it, he would also keep a copy for The Realm. That was efficient. Force’s pet project was creating a database of systems and networks for The Realm, so he simply added the new information to its database.
Force’s great passion was mapping new networks, and new mini-networks were being added to the main X.25 networks all the time. A large corporation, such a BHP, might set up its own small-scale network connecting its offices in Western Australia, Queensland, Victoria and the United Kingdom. That mini-network might be attached to a particular X.25 network, such as Austpac. Get into the Austpac network and chances were you could get into any of the company’s sites.
Exploration of all this uncharted territory consumed most of Force’s time. There was something cutting-edge, something truly adventurous about finding a new network and carefully piecing together a picture of what the expanding web looked like. He drew detailed pictures and diagrams showing how a new part of the network connected to the rest. Perhaps it appealed to his sense of order, or maybe he was just an adventurer at heart. Whatever the underlying motivation, the maps provided The Realm with yet another highly prized asset.
When he wasn’t mapping networks, Force published Australia’s first underground hacking journal, Globetrotter. Widely read in the international hacking community, Globetrotter reaffirmed Australian hackers’ pre-eminent position in the international underground.
But on this particular day, Par wasn’t thinking about getting a copy of Globetrotter or asking Force to scan a network for him. He was thinking about that secret. Force’s new secret. The secret Parmaster desperately wanted.
Force had been using DEFCON to scan half a dozen networks while he chatted to Par on Altos. He found an interesting connection from the scan, so he went off to investigate it. When he connected to the unknown computer, it started firing off strings of numbers at Force’s machine. Force sat at his desk and watched the characters rush by on his screen.
It was very odd. He hadn’t done anything. He hadn’t sent any commands to the mystery computer. He hadn’t made the slightest attempt to break into the machine. Yet here the thing was throwing streams of numbers. What kind of computer was this? There might have been some sort of header which would identify the computer, but it had zoomed by so fast in the unexpected data dump that Force had missed it.
Force flipped over to his chat with Par on Altos. He didn’t completely trust Par, thinking the friendly American sailed a bit close to the wind. But Par was an expert in X.25 networks and was bound to have some clue about these numbers. Besides, if they turned out to be something sensitive, Force didn’t have to tell Par where he found them.
`I’ve just found a bizarre address. It is one strange system. When I connected, it just started shooting off numbers at me. Check these out.’
Force didn’t know what the numbers were, but Par sure did. `Those look like credit cards,’ he typed back.
`Oh.’ Force went quiet.
Par
Comments (0)