Vol. 7 No. 1
Introduction to Hacker Wargaming
____________________________________________________________
Since we began running the Hacker Wargame in
March 1988, so far (Oct. 1998)
we have just two winners (blips and spagheti -- GALF doesn't count
because
they committed a felony to get in) -- and lots of questions about how
to
become a winner. "Please explain keystroke by keystroke," people ask
again
and again.
Sorry, I can't do that for you. The
problem is, when we made the Wargame
easy to win, certain script kiddies came in and repeatedly erased key
parts
of the operating system of the Wargame computer -- which is a pain
to fix.
So we decided to set up the Wargame so it was harder to use script
kiddie
programs. The result, sad to say, was that winners became rare.
It's pretty boring when only two people are
able to not just break into but
maintain control of one of our Wargame computers. (You aren't
a winner
unless you can maintain control.) So this Wargaming series is intended
to
teach you, the aspiring Uberhacker, how to rise above the level of
the
script kiddie. If this series is successful, you will learn how
hackers
such as blips and spagheti have become computer security experts instead
of
mere script kiddies. You will have the opportunity to follow
in their
footsteps by learning how to discover new computer vulnerabilities,
and
learning how to fix them yourself, without being told "keystroke by
keystroke."
************************************************************
In this GTMHH you will learn:
* What are script kiddies and why they are lame
* Why setting up your own LAN (local area network) is the best way
to become
an Uberhacker
* What kind of hardware you will need
* How to get hardware cheap
* How to get operating system software cheap
*************************************************************
What Are Script Kiddies, and Why they Are Lame
Want to know exactly what a script kiddie is?
The Web site
http://www.antionline.com carries
some of the best news about computer
break-ins. Its owner, John Vranesevich <jp@antionline.com>
is a
self-described hacker, and has interviewed and listened to thousands
of
hackers. With his permission, here we reprint his recent editorial
"Facing
the Age of the Script Kiddies"
In the past, a hacker was an individual who literally had to spend years
to learn the inner workings of computer technology, programming, and
hardware. Only then could he begin to explore possible vulnerabilities, and
develop, for himself, ways to exploit those vulnerabilities, and more
importantly, ways to patch them. Through out these years of learning, the
hacker would develop a certain respect for the technology that he was
studying, and a certain level of maturity would inherently develop as well.
Now, in present day society, with point and click utilities abound, a
younger, less mature, less knowledgeable, and less respectful, generation of "hackers" have come to life. Individuals who haven't had to go through the years of learning, and study. Individuals, who because of the lack of experiencing this "learning process" have not developed the traits which once went hand in hand with the persona of
"hacker". Kids who are at that age, where they have very little self
respect, and even less respect for others. Kids who are insecure, and have
a strong desire to feel that sense of belonging. The sense of being
accepted as part of a group, and respected among their peers. The same
emotional state which once led inner city youth to gangs, is now leading
them to "hacking". Individuals who feel the ultimate sense of power in
"hacking a webpage". Their words being read by thousands of others. Their
ability to control something. The technology is not a love, but a tool to
accomplish something much more in their eyes. A tool that can be used to
gain them acceptance, a feeling of empowerment, belonging, and control. A
tool to allow them to escape the ridicule of the kids on the bus, or the
back of their parent's hand.
Oh, and I can hear people screaming "stereotyping" right now. Well, call
it what you may. I've talked to literally thousands of these so called
"hackers" over the past 5 or 6 years. You'd be surprised at how clear of a
mold many of them come from. I am really sick of hearing "we hacked that
page to get a message out". Perhaps, in some very, very, rare cases, that
is true. But, I submit to you, the vast majority of time a hack is done
first, and a political agenda is developed after hand to help rationalize
the crime. On top of that, one hardly has to "hack a webpage" to get their
point of view told.
That's the wonder of the Internet. Everyone is an equal. Everyone has the
opportunity to post their views, and share their thoughts. Once again,
these so called "hackers" avoid the developmental process. They don't want
to spend the time and energy necessary to create a successful website of
their own. So, they maliciously exploit the work of others that have. I'm
19 years old right now. I know what it is like being upset about something, and feeling that there's no way to share that with others.
That's one of the reasons that I made AntiOnline. It's my forum. My way of
expressing my views on things. To think of me, a 19 year old college drop
out. Yet, my work is viewed millions of times every month. That, my little
"hacker" friends, is power. That is what the Internet is about. That's why
it works. That's why it's growing.
Unless you change your ways soon, you will never be truly experiencing
the wonder that technology is. To truly love technology, love how it is
changing our society, bringing mankind together in a way never before
experienced in the history of the human race. You'll never truly be
experiencing the very thing that you feel you have ultimate control over. A
true irony indeed.
Of course, as with all things, there is hope. There are people out their
hanging on tightly to the ways of old, and the true hacker identity. There
are groups like L0pht, the distributed.net bovine group, and the kids down
at your local high school learning visual basic.
Those are the true hackers. A desire to learn, a desire to be the first
to discover something new. A true hacker mentality is something that
shouldn't be thought of as a dark, mischievous thing, but perhaps, more
like that of a scientist. Study, learn, experiment, and share what you've
found with others......Yours In CyberSpace,
John Vranesevich
Founder, AntiOnline
Why Setting up your own LAN Is the Best Way to
become an Uberhacker
OK, so you want to become more than a script
kiddie? So do I. Here's what
the best hackers I know say was their route to the top: wargaming on
their
own and friends' LANs (local area networks). This is a study
technique used
by the kind of people who can slide through computer systems like ghosts
wafting through walls.
"Wait! Wait!" some of you are saying.
"I thought hackers learn by
illegally breaking into the computers of strangers!" True, plenty of
people
you meet on hacker mailing lists and on IRC make out like they are
computer
security experts by day and computer criminals by night. There
even are
people who have been convicted of computer crimes who work as security
experts. These guys probably are telling you the truth when they
say they
were foolish enough to learn their trade by committing crime.
However, crime often leads to prison, and
prison is no fun. Guess what
happens when bad breath cellmate "Bubba" decides you're cute?
Guess what
happens when your name is Kevin Mitnik and Hollywood makes a movie
full of
lies about you? Besides, when you break into a computer illegally,
you miss
out on the most fun part, which is being the guy who is fighting back!
So ... are you ready to learn about breaking
into and defending computers
the way the Uberhackers do it? Ready to learn how to run your own hacker
wargames?
You can get started with newbie wargaming
by reading the GTMHHs on "How to
Break into Windows 95 from the Internet." (See http://www.happyhacker.org)
These show you how to set up your Win95 box so you and your friends
can
practice breaking into each others' computers over the Internet.
This will
give you a good start. But this approach has some problems --
such as you
only learn newbie stuff, and strangers might find your purposely vulnerable
Win95 or Win98 box connected to the Internet -- and do terrible things
to it.
If you want a wargaming technique that will
take you all the way to the
top, you need to set up a local area network in your home, and get
your
friends to set up networks, too. Then you can experiment with
configuring
firewalls and proxy servers, getting several computers with different
operating systems working together, and trying out LAN networking techniques
such as Netware, Microsoft Network, and TCP/IP; and much more.
You can
increase your fun by trading accounts on your network for accounts
on your
friends' LANs and get to freely experiment with many LANs.
*************************************************************
Newbie note: If you are a kid, the FIRST thing you will probably want
to do
is make sure your parents understand why hacker wargaming will make
you rich
and famous instead of in jail and infamous. Here's how
Paradox@kpservices.com
won over his parents.
"I wrote to you a while ago about how to get my parents to accept the fact******************************************************
of their son being a white-hat hacker... You gave me the advice to show
them your article in the October issue of _Scientific American_ (which was a masterpiece, btw) and take it from there. Right after my dad read it ... All was well! Then, by coincidence, my best friend's Win95 box on a vulnerable cable connection was invaded as part of a dumb IRC war he had going on... The intruders... trashed my friend's box by using Back Orifice and then proceeded to mess with the
server our business page was on (along with our other e-mail addresses). My
parents ... are now security paranoid and want me to find out as much as I
can about computer security. My Aunt (a Sun Microsystems employee) is
getting me an Ultra 5 SPARC Workstation for Christmas too! My parents are
also buying me a copy of Windows NT and System Commander so I can run Linux
too! I'm also going to get a (secure) cable connection to the workstation
in my room.
THANK YOU! THANK YOU! THANK YOU!
What Kind of Hardware you Will Need -- and How to Get it Cheap
"Wait! Wait!" some guys are saying. "I'm
not rich enough to build my own
hacker research laboratory!" Guess what, you can put together
a really
impressive lab for only a few hundred dollars.
Have you visited the web page of our Wargame
computer
http://koan.happyhacker.org?
The Web pages downloaded pretty fast, right?
Did you get into the guest account and make merry with all the other
guys
who had shells on koan? (Hint: the password for the guest account
is really
stupid. Even a stupid person can guess it.) Did you give the netstat
command
and see how many people were browsing its Web sites, making ftp connections
and logged into shells all at once? Did you know that koan is a mere
25 Mhz
486 box?
Koan is so powerful because it runs FreeBSD,
a Unix type of operating
system, instead of Windows. (The RAM disk for the temp directory helps,
too:) Almost any Unix type operating system can take an ancient Intel-type
computer and make it run fast! The 200th fastest supercomputer
in the world
is a bunch of PCs running Linux and hooked together in parallel, in
operation at Los Alamos National Laboratories.
You can get a 25 Mhz PC, or even faster ones,
for almost nothing. Because
they are so common, you can find cheap used ones in the classified
ads in
the local paper, or buy them from computer stores that specialize in
used
equipment. Then install Unix type operating systems on them.
Or, for major fun, buy ancient workstation
computers. You will rarely see
them for sale in the classified ads of newspapers. However, you
can often
pick them up at auctions. Of course you need to know a thing
or two about
the hardware you buy at auctions, because usually you won't get to
try them
out before bidding on them. Many people who buy workstations
at auctions
figure most of them have things wrong with them. So they buy
a bunch of
them and then use parts from some of them to fix the others.
You would be surprised by what an ancient
Sun can do. A Sun SPARC
workstation running at 25 Mhz is surprisingly fast for the same reason
a 25
Mhz PC is fast running some sort of Unix -- it's the Unix that makes
it
fast! In addition, if you want to have many simultaneous users,
for example
if you want to give shell accounts to many users, a Sun should be faster
than a PC with an equivalent clock speed.
If you don't feel you have the hardware expertise
to piece together a cheap
Sun workstation yourself, by paying a little bit more you can buy them
from
resellers who get them at auctions. If you can find a local auction
that
sells workstations, you best bet may be to go to the auction and introduce
yourself to the people you see buying hardware that you want to own.
They
will probably be willing to resell to you as soon as they get the equipment
working.
If you can't find a cheap place to buy workstations
nearby, there are two
places in Albuquerque where you can get refurbished workstations:
http://nmol.com/users/jcents
(email jcents@nmol.com); or email
Jake Garcia
at jakeg@rt66.com. They pick
them up at auctions of used equipment from
places such as Sandia National Laboratories, where people design nuclear
weapons and nanomachinery. Sorry, you won't find classified data
left
behind on these workstations!
Your next step in getting ready to set up
your hacker laboratory is the
networking equipment. How do you get your computers talking to
each other?
For that I recommend a 10BaseT Ethernet. This is probably the
easiest
network you can set up.
The hardware you will need for an Ethernet
will consist of a hub, an
Ethernet device for each computer you plan to network together, and
either
Category 3 or Category 5 Ethernet cables. The Ethernet cables
look like
oversized phone cables.
You can usually find a used hub for $20 or
so at a used computer store.
Workstations usually have an Ethernet device of some sort already built
into
them. However, look to see whether yours has a connector on the back
that
looks like a slightly oversized phone jack. If it does, great.
If instead
your workstation only has a connector that looks like what you use
for a
cable TV (round with a wire in the center), and next to it a connector
that
looks like the serial port on the back of your PC, you have a slight
problem. You will need to buy an AUI to 10BaseT transceiver.
It is a
little box with LEDs on it which hooks on one side to the thing that
looks
like a serial port, and on the other side has a thing that looks like
a big
phone jack. These are somewhat hard to find, and cost about $30
new. The
electronic parts supplier Hamilton Hallmark sells them, as do many
other
electronics parts suppliers. You rarely will find these transceivers
in
computer stores because the average consumer doesn't run around networking
old Unix workstations.
For PCs you usually need to buy an Ethernet
card. Even new, you can buy
one for only $20. The cabling costs very little, and can often
be gotten
for free if you pay a visit to an office building that is being renovated.
I've gotten several hundred feet of Cat3 cable that way.
Once you have gotten this far, you have all
the hardware you need for your
hacker laboratory.
How to Get Operating System Software Cheap
Your next problem will be operating system
software. One problem with
buying old Unix workstations is that they generally have old operating
systems for which there are many exploit programs floating around the
Internet. While it may be fun for a while proving to yourself
that within
seconds you can break into these old boxes, pretty soon this will get
boring. You will get the craving to upgrade to the latest versions
of these
operating systems.
This is where you may get to faint, when you
find out what this costs.
There are exceptions, however.
My favorite kind of used workstations is Suns.
The reason I like old Suns
is that you can either run them using whatever operating system it
came with
(either Sun OS or Solaris, which will probably be an old version and
easy to
break into) or you can upgrade cheaply to the latest version of Solaris,
to
Sun Linux, or Sun OpenBSD. Even a SPARC 1 can run the latest
versions of
all of these! To get the latest Solaris for almost nothing, see
http://www.sun.com/developers/solarispromo.html.
This offer includes the
manuals as well as a set of installation CDs. Or, you can get a version
of
Linux that runs on Sun workstations (Red Hat) at http://www.redhat.com,
or
of OpenBSD from http://www.openBSD.org.
For PCs, your best bet for cheap Unix, if
you are a total beginner, is Red
Hat. It is easy to install and tech support is great. There
are at least
two other Linux distributions that beginners find easy to use: Slackware
3.5
(http://www.cdrom.com) and Debian
(http://www.debian.com). While
they are a
bit harder to install, they are easier to make secure.
You can also get a version of Solaris that
will run on PCs (see above URL).
If Linux is new to you, check out http://sunsite.unc.edu/mdw/ldp.html
for
lots of beginner information. Or, start out with Trinux, at
http://www.trinux.org, for a beginner's
version that doesn't require you to
repartition your hard disk (which the other Linuxes do).
If you are already a power user of Linux,
and want to build a really secure
LAN, you may wish to move up to either FreeBSD (http://www.freebsd.org
or
http://www.cdrom.com) or Open BSD
(http://www.openbsd.org). These
operating
systems, along with Solaris 2.6 and above, are designed to resist most
of
the buffer overflows that are the basis of many break-in techniques.
These
BSD operating systems are more difficult to install, however.
I wish I could tell you how to get a cheap
version of Windows NT Server
4.0. However, the only way I know of is not exactly legal. You
may be able
to obtain a free beta copy of Windows NT 5.0, however -- keep checking
out
the Microsoft Web site (http://www.microsoft.com)
for opportunities.
How about LAN software? If you have
decided to work with Windows only, and
don't plan on connecting your LAN to the Internet, all you have to
do is
cable each computer to your hub, and point and click your way through
networking. As for Novell Netware -- sorry, I don't know of a cheap
way to
get it.
If you are serious about hacking, you will
be connecting several different
operating systems together on your LAN. For this I recommend
using TCP/IP
and making one of your computers a gateway to the Internet. This
is a
little harder than "Network Neighborhood" style networking. I
know that
because -- you will be shocked to hear this -- I am living proof that
it is
easy to make mistakes when setting up a TCP/IP network. Imagine
that! So
I'm going to devote the next Guide in this series to how to set up
a LAN
with an Internet gateway and both Windows and Unix boxes on it using
TCP/IP.
Maybe I can figure out how to explain it so it will be easier for you
than
it was for me.
Thanks to keydet89@yahoo.com
for reviewing and contributing to this Guide.
_______________________________________________________________________
Where are those back issues of GTMHHs and Happy Hacker Digests? Check
out
the official Happy Hacker Web page at http://www.happyhacker.org.
We are against computer crime. We support good, old-fashioned hacking
of the
kind that led to the creation of the Internet and a new era of freedom
of
information. But we hate computer crime. So don't email us about
any crimes
you may have committed!
To subscribe to Happy Hacker and receive the Guides to (mostly) Harmless
Hacking, please email hacker@techbroker.com with message "subscribe
happy-hacker" in the body of your message.
Copyright 1998 Carolyn Meinel. You may forward, print out or
post this
GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you
leave
this notice at the end.
_________________________________________________________