Underground: Tales of Hacking, Madness and Obsession from the Electronic Frontier

Read Online Underground: Tales of Hacking, Madness and Obsession from the Electronic Frontier by Suelette Dreyfus - Free Book Online Page A

Book: Underground: Tales of Hacking, Madness and Obsession from the Electronic Frontier by Suelette Dreyfus Read Free Book Online
Authors: Suelette Dreyfus
Ads: Link
copy. It has several other features including a brute force attack.

    Once the worm has successfully penetrated your system it will infect
    .COM files and create new security vulnerabilities. It then seems to broadcast these vulnerabilities to the outside world. It may also damage files as well, either unintentionally or otherwise.

    An analysis of the worm appears below and is provided by R. Kevin Oberman of Lawrence Livermore National Laboratory. Included with the analysis is a DCL program that will block the current version of the worm. At least two versions of this worm exist and more may be created. This program should give you enough time to close up obvious security holes. A more thorough DCL program is being written.

    If your site could be affected please call CIAC for more details...

    Report on the W.COM worm.

    R. Kevin Oberman

    Engineering Department

    Lawrence Livermore National Laboratory

    October 16, 1989

    The following describes the action of the W.COM worm (currently based on the examination of the first two incarnations). The replication technique causes the code to be modified slightly which indicates the source of the attack and learned information.

    All analysis was done with more haste than I care for, but I believe I have all of the basic facts correct. First a description of the program:

    1. The program assures that it is working in a directory to which the owner (itself) has full access (Read, Write, Execute, and Delete).

    2. The program checks to see if another copy is still running. It looks for a process with the first 5 characters of ‘NETW_’. If such is found, it deletes itself (the file) and stops its process.

    NOTE

    A quick check for infection is to look for a process name starting with ‘NETW_’. This may be done with a SHOW PROCESS command.

    3. The program then changes the default DECNET account password to a random string of at least 12 characters.

    4. Information on the password used to access the system is mailed to the user GEMTOP on SPAN node 6.59. Some versions may have a different address.11

    5. The process changes its name to ‘NETW_’ followed by a random number.

    6. It then checks to see if it has SYSNAM priv. If so, it defines the system announcement message to be the banner in the program: W O R M S A G A I N S T N U C L E A R K I L L E R S
    _______________________________________________________________
    \__ ____________ _____ ________ ____ ____ __ _____/
    \ \ \ /\ / / / /\ \ | \ \ | | | | / / /
    \ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / /
    \ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ /
    \_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/
    \___________________________________________________/
    \ /
    \ Your System Has Been Officically WANKed /
    \_____________________________________________/
    You talk of times of peace for all, and then prepare for war.

    7. If it has SYSPRV, it disables mail to the SYSTEM account.

    8. If it has SYSPRV, it modifies the system login command procedure to APPEAR to delete all of a user’s file. (It really does nothing.) 9. The program then scans the account’s logical name table for command procedures and tries to modify the FIELD account to a known password with login from any source and all privs. This is a primitive virus, but very effective IF it should get into a privileged account.

    10. It proceeds to attempt to access other systems by picking node numbers at random. It then uses PHONE to get a list of active users on the remote system. It proceeds to irritate them by using PHONE to ring them.

    11. The program then tries to access the RIGHTSLIST file and attempts to access some remote system using the users found and a list of
    ‘standard’ users included within the worm. It looks for passwords which are the same as that of the account or are blank. It records all such accounts.

    12. It looks for an account that has access to SYSUAF.DAT.

    13. If a priv. account is found, the program is copied to that account and

Similar Books

Among Thieves

Douglas Hulick

Once a Rancher

Linda Lael Miller

The Diary of a Nose

Jean-Claude Ellena

Violent Spring

Gary Phillips