Return-Path: <sentto-279987-4432-1012970916-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 05 Feb 2002 20:52:08 -0800 (PST) Received: (qmail 7553 invoked by uid 510); 6 Feb 2002 04:49:01 -0000 Received: from n28.groups.yahoo.com (216.115.96.78) by all.net with SMTP; 6 Feb 2002 04:49:01 -0000 X-eGroups-Return: sentto-279987-4432-1012970916-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.164] by n28.groups.yahoo.com with NNFMP; 06 Feb 2002 04:48:36 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 6 Feb 2002 04:48:35 -0000 Received: (qmail 16790 invoked from network); 6 Feb 2002 04:48:34 -0000 Received: from unknown (216.115.97.172) by m10.grp.snv.yahoo.com with QMQP; 6 Feb 2002 04:48:34 -0000 Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 6 Feb 2002 04:48:34 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g164oBX25243 for iwar@onelist.com; Tue, 5 Feb 2002 20:50:11 -0800 Message-Id: <200202060450.g164oBX25243@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 5 Feb 2002 20:50:11 -0800 (PST) Subject: [iwar] [fc:Interview.with.an.ex-hacker] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Interview with an ex-hacker By James Middleton, Vnunet, 2/4/02 <a href="http://www.computing.vnunet.com/News/1128889">http://www.computing.vnunet.com/News/1128889> According to the defacement archive at Alldas.de, the hacker group known as the 'sm0ked crew' only terrorised websites throughout February of last year. But that was maybe enough for one member of the crew, Splurge, who decided to call it quits and go straight in the security industry. Eighteen-year-old Splurge, who withheld his real name, contacted vnunet.com to tell us his story. What prompted him to switch from a life of box breaking and defacing, to the somewhat more acceptable career of a security consultant selling denial of service (DoS) filter systems? "It's not the feds you have to worry about, it's always the other hackers that bring you down," he said. "They love to fight each other. They'll nark on you to the FBI just to get you off the scene." Splurge has had one such call from an FBI agent. "He just turned up on my doorstep. Just the standard agent type, he didn't really know anything. "But I'm worried because I've been falsely accused of stealing $500,000 worth of software, which I didn't do, it's some other hacker who's pinned this on me," he said. Splurge would not elaborate on this case, as he said it could still go to court. He said that the FBI has honeypots set up all over the internet, just to catch hackers. "I got tricked through five boxes," he said with a touch of humour. "That's how they caught me." But sometimes, said Splurge, hackers do get the Hollywood treatment. "Another hacker I know, going by the name of Darkness, broke into NASA. Next thing, his door was being kicked down by agents waving guns all over the place." But apart from getting arrested, Splurge assured us that the hacking and defacing scene is nothing like in the movies. "Films like 'Hackers' aren't even close," he said. "I got out of the scene because the crew was breaking down, there was too much in-fighting, and the danger of getting arrested was becoming more and more real." Although Splurge didn't know any other members of the sm0ked crew except by their screen name - "it's safer that way" - he maintains that someone else in the hacker community set him up to get him off the scene. "After we hacked Intel for the third time running, I had a visit from one of their security guys who had managed to trace me back. He offered me a job as some sort of pen tester in a startup security firm he was going to launch, but it didn't sound too ethical so I refused. Then he warned me not to touch Intel any more or he'd turn me in. It was about then I realised I wanted to get out." The stereotypical image of hackers is pretty accurate, according to Splurge. "It's really just a bunch of really smart kids trying to prove themselves. I know I was," he said. "They're not misfits, they're just trying to make their mark. Defacing is an easy way to get on the news." "It's almost as if they want to get caught," he added. "Obviously they don't want to go to jail, but they want to be known for their actions." But Splurge sounds like he's had a change of heart. "Anyone who leaves an insecure box attached to the net deserves it. But anyone who actually damages data should do time," he said. "We always left backups of any sites we defaced. "It's not hard to secure a box. An operating system is only as secure as the admin makes it. I use Linux all the way because I think it's easier to secure, but any operating system can be secured, even Windows. "Filtering out IPs that shouldn't be accessing certain servers eliminates 99 per cent of problems, and getting a decent firewall helps," he said. "People think defacers just use canned scripts to break sites," he continued, "but this is not necessarily true. A scanner is just a lot of hard work. I would go to a big site and just wade through each IP on the block looking for vulnerabilities." Most of the misinformation about hackers is propagated by the media, according to Splurge. "If the media stopped glorifying hackers, we wouldn't have this problem. They wouldn't be trying to make front page news. And they won't stop, either. For every one arrested, five more go free," he said. So what does a hacker do when he's done with making the news? "I work for a filtering firm. We stop denial of service attacks taking out networks like with Cloud 9, Tiscali and Donhost this week. But I'd like a better job in the security industry." And is there honour among data thieves? Not really. "As we speak, I'm just tracking someone who's hit one of my own personal boxes. I'm confident I'll get him, and when I do, I'll turn him in. I've no problem with that." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust When building an e-commerce site, you want to start with a secure foundation. Learn how with VeriSign's FREE Guide. http://us.click.yahoo.com/oCuuSA/XdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST