You Better Know You Your Onions Or You Might Wannacry
Total Page:16
File Type:pdf, Size:1020Kb
You Better know you your Onions or you might Wannacry Nicholas Lewis NWSSP IT Security and Development CISSP,CSSLP,MCSE,MCAD,CHECK QSTM Introduction • A Brief History Of Hacking • The Story Of Wannacry • Where do we go from here • Live hack demo at lunchtime ! A Brief History Of Hacking How It All Began 1903 Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming's public demonstration of Guglielmo Marconi's purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector 1932 Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code. 1939 Alan Turing, Gordon Welchman and Harold Keen worked together to develop the Bombe (on the basis of Rejewski's works on Bomba). The Enigma machine's use of a reliably small key space makes it vulnerable to brute force. A Brief History Of Hacking How It All Began 1971 John T. Draper (later nicknamed Captain Crunch), his friend Joe Engressia, and blue box phone phreaking hit the news with an Esquire Magazine feature story. 1972 Before starting Apple, Steve Jobs and Steve Wozniak built and sold digital blue boxes, for around $100. One of their first calls they made using the blue box was to the Vatican with Wozniak pretending to be Henry Kissinger, they asked to talk to the pope. Without success. 1979 Kevin Mitnick breaks into his first major computer system, the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. A Brief History Of Hacking How It All Began 1980 The FBI investigates a breach of security at National CSS. The New York Times, reporting on the incident in 1981, describes hackers as “Technical experts; skilled, often young, computer programmers, who almost whimsically probe the defences of a computer system, searching out the limits and the possibilities of the machine. Despite their seemingly subversive role, hackers are a recognized asset in the computer industry, often highly prized” The newspaper describes white hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated that "The Company realizes the benefit to NCSS and in fact encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files" 1981 Ian Murphy aka Captain Zap, was the first cracker to be tried and convicted as a felon. Murphy broke into AT&T's computers in 1981 and changed the internal clocks that metered billing rates. People were getting late-night discount rates when they called at midday. Of course, the bargain-seekers who waited until midnight to call long distance were hit with high bills 1983 The movie WarGames introduces the wider public to the phenomenon of hacking and creates a degree of mass paranoia of hackers and their supposed abilities to bring the world to a screeching halt by launching nuclear ICBMs A Brief History Of Hacking How It All Began 1986 After more and more break-ins to government and corporate computers, Congress passes the Computer Fraud and Abuse Act, which makes it a crime to break into computer systems. The law, however, does not cover juveniles 1986 Robert Schifreen and Stephen Gold are convicted of accessing the Telecom Gold account belonging to the Duke of Edinburgh under the Forgery and Counterfeiting Act 1981 in the United Kingdom, the first conviction for illegally accessing a computer system. On appeal, the conviction is overturned as hacking is not within the legal definition of forgery 1986 Arrest of a hacker who calls himself The Mentor. He published a now-famous treatise shortly after his arrest that came to be known as the Hacker's Manifesto in the e-zine Phrack. This still serves as the most famous piece of hacker literature and is frequently used to illustrate the mindset of hacker A Brief History Of Hacking The Hacker Manifesto This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin colour, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. A Brief History Of Hacking How It All Began 1990 The Computer Misuse Act 1990 is passed in the United Kingdom, criminalising any unauthorised access to computer system 1992 One of the first ISPs MindVox opens to the public 1993 The first DEF CON hacking conference takes place in Las Vegas. The conference is meant to be a one-time party to say good-bye to BBSs (now replaced by the Web), but the gathering was so popular it became an annual event A Brief History Of Hacking The UK Computer Misuse Act 1990 The act created three categories of offence: Unauthorised access to computer material: There must be intent to access a program or data stored on a computer, and the person must know that this access is not authorised. This is why login screens often carry a message saying that access is limited to authorised persons: this may not prevent a determined and ingenious hacker getting access to the system, but they will not be able to claim ignorance of committing an offence. Unauthorised access with intent to commit a further offence: for instance accessing personal files or company records in order to commit fraud or blackmail. Unauthorised modification of programs or data on a computer. Modification of a computer's contents under section 3 may consist of: Altering data As in the case of a nurse who observed a doctor entering his password and used it to alter patients' drug dosages and treatment records Removing data For instance to cover up evidence of wrongdoing Adding to the contents of a computer For instance it has been held that sending an email under a false name results in unauthorised modifications to the content of the mail server The intent need not be directed at any particular computer, program or data, so this provision covers damage caused by computer viruses - even though the virus author need not have known or intended that any particular system would be affected A Brief History Of Hacking How It All Began 1994 Hacking Theft of $10 Million From Citibank Revealed 1996 Cryptovirology is born with the invention of the cryptoviral extortion protocol that would later form the basis of modern ransomware. 1999 Software security goes mainstream In the wake of Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). Hundreds of advisories and patches are released in response to newfound (and widely publicized) bugs in Windows and other commercial software products. A host of security software vendors release anti-hacking products for use on home computers. A Brief History Of Hacking Citibank From a computer terminal in his apartment in St. Petersburg, Russia, a Russian software engineer broke into a Citibank computer system in New York and with several accomplices stole more than $10 million by wiring it to accounts around the world, according to court documents and the U.S. attorney's office. Citibank said all but $400,000 of the stolen funds have been recovered. Six hacking suspects have been arrested, including the engineer, Vladimir Levin, who is being held in Britain and is fighting extradition to the United States. The incident underscores the vulnerability of financial institutions as they come to increasingly rely on electronic transactions. But computer security experts say what is even more notable about the case is that it became public. "Can it happen? Yes. Does it happen? Yes," said Eugene Schultz, a computer security expert at SRI International. "But we don't hear about it because financial institutions are afraid of adverse publicity." The Citibank case became public as a result of the extradition effort. A Brief History Of Hacking How It All Began 2001 Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's websites are corrupted. A Dutch cracker releases the Anna Kournikova virus, initiating a wave of viruses that tempts users to open the infected attachment by promising a sexy picture of the Russian tennis star 2002 Bill Gates decrees that Microsoft will secure its products and services, and kicks off a massive internal training and quality control campaign. 2003 The hacktivist group Anonymous was formed. A Brief History Of Hacking How It All Began 2004 North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems 2006 The largest defacement in Web History as of that time is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot.