STEALING the NETWORK How to Own a Shadow

Total Page:16

File Type:pdf, Size:1020Kb

STEALING the NETWORK How to Own a Shadow www.sharexxx.net - free books & magazines 363_Web_App_FM.qxd 12/19/06 10:46 AM Page ii 384_STS_FM.qxd 1/3/07 10:04 AM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value-added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at [email protected] for more information. CUSTOM PUBLISHING Many organizations welcome the ability to combine parts of multiple Syngress books, as well as their own content, into a single volume for their own internal use. Contact us at [email protected] for more information. 384_STS_FM.qxd 1/3/07 10:04 AM Page ii 384_STS_FM.qxd 1/3/07 10:04 AM Page iii STEALING THE NETWORK How to Own a Shadow THE CHASE FOR KNUTH Johnny Long Timothy (Thor) Mullen Ryan Russell 384_STS_FM.qxd 1/3/07 10:04 AM Page iv Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other inci- dental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJIRTCV764 002 PO9873D5FG 003 829KM8NJH2 004 YRT43998KL 005 CVPLQ6WQ23 006 VBP965T5T5 007 HJJJ863WD3E 008 2987GVTWMK 009 629MP5SDJT 010 IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Stealing the Network: How to Own a Shadow Copyright © 2007 by Elsevier, Inc.All rights reserved. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1 2 3 4 5 6 7 8 9 0 ISBN-10: 1-59749-081-4 ISBN-13: 978-1-59749-081-8 Publisher:Andrew Williams Page Layout and Art: Patricia Lupien Editor: D. Scott Pinzon Copy Editor: Christina LaPrue For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, email [email protected]. 384_STS_FM.qxd 1/3/07 10:04 AM Page v Acknowledgments Syngress would like to acknowledge the following people for their kindness and support in making this book possible. A special thank you to all of the authors and editors who worked on the first three books in the “Stealing” series, each of whom is listed individually later in this front matter. To Jeff Moss and Ping Look of Black Hat, Inc. who have been great friends and supporters of the Syngress publishing program over the years.The Black Hat Briefings have provided the perfect setting for many Stealing brainstorming sessions. v 384_STS_FM.qxd 1/3/07 10:04 AM Page vi 384_STS_FM.qxd 1/3/07 10:04 AM Page vii Authors Johnny Long: Author, Technical Edit, Primary Stealing Character: Pawn Who’s Johnny Long? Johnny is a Christian by grace, a family guy by choice, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. My home on the web is http://johnny.ihackstuff.com. This page can support only fraction of all I am thankful for.Thanks first to Christ without whom I am nothing.Thanks to Jen, Makenna,Trevor and Declan.You guys pay the price when deadlines hit, and this book in partic- ular has taken me away from you for far too long.Thanks for understanding and supporting me.You have my love, always. Thanks to Andrew and Christina (awesome tech edit) and the rest of my Syngress family.Thanks to Ryan Russell (Blue Boar) for your contribu- tions over the years and for Knuth.What a great character! Thanks to Tim “Thor” Mullen.We work so well together, and your great ideas and collaborative contributions aside, you are a great friend. Thanks to Scott Pinzon for the guidance and the editorial work.Your contribution to this project has literally transformed my writing. Thanks to Pawn. If I have my say, we’ll meet again. Thanks to the johnny.ihackstuff.com mods (Murf, Jimmy Neutron, JBrashars, CP Klouw, Sanguis,ThePsyko,Wolveso) and members for your help and support.Thanks to RFIDeas for the support, and to Pablos for the RFID gear.Thanks to Roelof and Sensepost for BiDiBLAH, to NGS for the great docs, to nummish and xeron for Absinthe. Thanks to everyone at the real Mitsuboshi dojo, including Shidoshi and Mrs.Thompson, Mr.Thompson, Mr. Stewart, Mrs. Mccarron, Mrs. Simmons, Mr. Parsons, Mr. Birger, Mr. Barnett, Ms. Simmons, Mr. Street, Mrs. Hebert, Mrs. Kos, Mrs.Wagner and all those not listed on the official instructor sheet. vii 384_STS_FM.qxd 1/3/07 10:04 AM Page viii Shouts: Nathan “Whatever” Bowers, Stephen S, Mike “Sid A. Biggs”, John Lindner, Chaney, Jenny Yang, SecurityTribe, the Shmoo Group, Sensepost, Blackhat, Defcon, Neal Stephenson (Baroque), Stephen King (On Writing),Ted Dekker (Thr3e), Project86, Shadowvex, Green Sector, Matisyahu,Thousand Foot Krutch, KJ-52 (Slim Part 2).To Jason Russell, Bobby Bailey and Laren Poole for the Invisible Children movement (http://www.invisiblechildren.com). Timothy (Thor) Mullen: Created concept for this book, Author, Technical Edit, Primary Stealing Character: Gayle Thor has been educating and training users in the tech- nology sector since 1983 when he began teaching BASIC and COBOL through a special educational pro- gram at the Medical University of South Carolina (while still a high school senior). He then launched his professional career in application development and network integration in 1984. Timothy is now CIO and Chief Software Architect for Anchor Sign, one of the 10 largest sign-system manufacturers in America. He has developed and implemented Microsoft networking security solutions for institutions like the US Air Force, Microsoft, the US Federal Courts, regional power plants, and international banking/financial institutions. He has developed applications ranging from military aircraft statistics interfaces and biological aqua-culture management to nuclear power-plant effects monitoring for private, government, and military entities.Timothy is currently being granted a patent for the unique architecture of his payroll processing engine used in the AnchorIS accounting solutions suite. Timothy has been a columnist for Security Focus’ Microsoft section, and is a regular contributor of InFocus technical articles. Also known as “Thor,” he is the founder of the “Hammer of God” security co-op group. His writings appear in multiple publications such as Hacker’s Challenge, the Stealing the Network series, and in Windows XP Security. His security tools, techniques and processes viii 384_STS_FM.qxd 1/3/07 10:04 AM Page ix have been featured in Hacking Exposed and New Scientist Magazine, as well as in national television newscasts and technology broadcasts. His pioneering research in “strikeback” technology has been cited in multiple law enforcement and legal forums, including the International Journal of Communications Law and Policy. Timothy holds MCSE certifications in all recent Microsoft operating systems, has completed all Microsoft Certified Trainer cur- riculums and is a Microsoft Certified Partner. He is a member of American Mensa, and has recently been awarded the Microsoft “Most Valuable Professional” (MVP) award in Windows Security for the second straight year.
Recommended publications
  • Dulles Wants Face Reds with Force
    / r FRIDAY, FEBRUARY 6, PAGS SIA'J'fiBH lianrl^patpr ^u^ninQ If^ralb Atrerage'DsIty Net Press Run Th« Wskihor For tlw Week Ending Foreenet of C. S. WentlMr BnoM JsmHiry 81, 18$9 SI. John's Yoiith Club will meig loseph P. Dyer Jr„ aon of Mr. Tha Bona of Italy wiU nMet Sun­ ' Several membera of ' the Man­ Mr. and Mrs. John R. McEl- Wapping Grange will meet cheater Republican Women'e Club G E N tllA l Clondy. not.M eoid tamlfM. tanr Tuesday evening.■ II. will be Home al the Mancheater Bowling Green nd Mra. Joaeph p. Dyer, 4.6 Falr- day afternoon at 2:80 «.t the Ital­ rte\'j‘ wHlj be the host and boat- f- n . ian American Club, Final arrange­ are planning to attend the legiala-' eas at .^e Lula Junior Museum ; Economic Night,, aiid one of the ' tomorrow afternoon at'*l o'clock. vW- St., waa recently elected prea- 1 2 > 8 7 9 15 to to. WSfiwer Snndny,' elianen About Town ident, of Maxey Hall, dormltoty at ments for the banQuet to be held tive hearing on court reform Mon­ TV SERVICE Sunday afternoon from 3 to ,5, features of the program wUj be a Member of tho Audit of rein. High 40 to 48. The flleanera Circle of the South Brcmh University. Providence, R. Feb. 15 will be made. day. Any Republican woman in­ A ft»d We, for ,th« benefit of: o'clock. baking contest for men of the terested In joining them is asked OK A CM] Burenn of drcnlntlon.
    [Show full text]
  • Delta Sònic Aka Henri Maquet
    Distribuzione gratuita esclusivamente in formato digitale senza pubblicità Anno 5 - n°52 - novembre 2016 - € 0,00 www.lineatrad.com - italia: www.lineatrad.it - internazionale: www.lineatrad.eu Delta Sònic aka Henri Maquet Ès-trad a Bourgoin-Jallieu 50 anni di Fairport Convention Associazione Italie Nord Isère Festival delle Ciaramelle Jean-Philippe de Peretti Ande Bali e Cante Festival del Canto Spontaneo Baìa Trio Rencontres de Harpes Celtiques Dinan Vruja Henri Maquet L’Orage n. 52 - Novembre 2016 Contatti: [email protected] - www.lineatrad.com - www.lineatrad.itSommario - www.lineatrad.eu —04 Ès-trad —13 Festival delle Ciaramelle —23 33e Rencontres de 04 a Bourgoin-Jallieu 13 per Amatrice 23 Harpes Celtiques Dinan —10 Henri Maquet —15 XV Festival —25 50 anni di 10 (Delta Sònic) 15 Ande Bali e Cante 25 Fairport Convention 33e Rencontres de IX Festival —12 Jean-Philippe De Peretti —17 —26 12 17 Harpes Celtiques Dinan 26 del Canto Spontaneo Eventi Cronaca Interviste Recensioni Argomenti Music Inside Rimini ASCOLTATE SU RADIO CITTA’ BOLLATE www.radiocittabollate.it di Loris Böhm la trasmissione An Triskell riprende a gennaio, ogni GIOVEDÌ alle ore 21:30 Editoriale oi di Lineatrad non siamo ricancelliamo, finalmente all’enne- noi speriamo sempre che si possa tro- pazzi, è la situazione globale simo tentativo intravvediamo una luce vare una soluzione. Ndella musica folk che ci di- in fondo al tunnel: illumina un cartello Per quanto riguarda Lineatrad Televi- pinge così... tanto per parafrasare una che dice “la strada è interrotta per una sion, dopo infinite ricerche di mercato considerazione di Jessica Rabbit nel frana, tornare indietro e superare la per trovare una soluzione decente che film “Chi ha incastrato Roger Rabbit”.
    [Show full text]
  • EW LAB TESTS VOLT -OHM -MILLIAMMETERS CATV -Its Future Starts Now COLOR TV for 1971 DIGITAL INSTRUMENTS -More on Electronic Counters
    World Electronics i MARCH, 971 60 CENTS EW LAB TESTS VOLT -OHM -MILLIAMMETERS CATV -Its Future Starts Now COLOR TV FOR 1971 DIGITAL INSTRUMENTS -More on Electronic Counters EW Lab Tests NEW DOLBY-IZED CASSETTE DECKS 3`35'11:101-M4 1dl)10iÁ rin +056b 15 M NIZZOÓ566tiA3AdH N(lf %.(,' £pgÓ1108THIdO. www.americanradiohistory.com 1OW you can measure resistors accurately N CIRCUIT in solid state devices A A FE21 HI -LO with 41/2-inch meter $99.50 FE20 HI -LO with hi- voltage probe and large six -inch meter $129.50 WITH THE NEW HI -LO FIELD EFFECT MULI METERS USES ONLY .08 VOLTS TO POWER OHMMETER TO PREVENT TRANSI;TORw FROM CONDUCTING AND UPSETTING READINGS Look at these extra features to see why the Hi -Lo meter be'ongs on your want list: 9 DC current ranges from 100 microamps to 1 15 input Unbelievable specifications of megohm amp impedance on DC and 12 megohms on AC Automatic built -in battery test . ne,'Er a worry Laboratory accuracy of 1.5 percent on DC and about rundown batteries, just push the switches 3 percent on AC under the meter and read. as .1 full 9 DC voltage ranges from as low volts Standard .6 amp fuse to prote. t the ohms and scale to '000 volts milliamps scales if voltage or ove-load is ac- 3 hi- voltage ranges of 3 KV, 10 KV and 30 KV cidentally applied. No more nead to return the meter to factory for repair . just replace the 9 DC zero center ranges from .05 volts to 500 fuse.
    [Show full text]
  • Confess, Fletch
    Gregory Mcdonald Confess, Fletch Gregory Mcdonald is the author of twenty-five books, including nine Fletch novels and three Flynn mysteries. He has twice won the Mystery Writers of America’s prestigious Edgar Allan Poe Award for Best Mystery Novel, and was the first author to win for both a novel and its sequel. He lives in Tennessee Books by Gregory Mcdonald Fletch Fletch Won Fletch, Too Fletch and the Widow Bradley Carioca Fletch Confess, Fletch Fletch’s Fortune Fletch’s Moxie Fletch and the Man Who Son of Fletch Fletch Reflected Flynn The Buck Passes Flynn Flynn’s In Skylar Skylar in Yankeeland Running Scared Safekeeping Who Took Toby Rinaldi? (Snatched) Love Among the Mashed Potatoes (Dear Me) The Brave Exits and Entrances Merely Players A World Too Wide The Education of Gregory Mcdonald (Souvenirs of a Blown World) TO Judy and Lew, Susie and Chuck, Stuart, Karen and Rupert, Jennette and Alan, HoRo, HoHo, Susi, Chris and Doug I F L E T C H snapped on the light and looked into the den. Except for the long windows and the area over the desk, the walls were lined with books. There were two red leather wing chairs in the room, a small divan, and a coffee table. On the little desk was a black telephone. Fletch dialled “O”. “Get me the police, please.” “Is this an emergency?” “Not at the moment.” The painting over the desk was a Ford Madox Brown—a country couple wrapped against the wind. “Then please dial ‘555-7523’.” “Thank you.” He did so.
    [Show full text]
  • The Country of the Blind, and Other Stories
    The Country of the Blind, And Other Stories H.G. Wells The Country of the Blind, And Other Stories Table of Contents The Country of the Blind, And Other Stories..................................................................................................1 H.G. Wells...............................................................................................................................................2 INTRODUCTION...................................................................................................................................4 I. THE JILTING OF JANE......................................................................................................................7 II. THE CONE.......................................................................................................................................11 III. THE STOLEN BACILLUS.............................................................................................................17 IV. THE FLOWERING OF THE STRANGE ORCHID......................................................................21 V. IN THE AVU OBSERVATORY.....................................................................................................25 VI. AEPYORNIS ISLAND...................................................................................................................29 VII. THE REMARKABLE CASE OF DAVIDSON'S EYES..............................................................35 VIII. THE LORD OF THE DYNAMOS...............................................................................................40
    [Show full text]