20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

what it sounds like: two or more hackers combining their skills and<br />

resources to infiltrate a given node. It has to be a slow hack unless<br />

you want to just bust in, but it’s pretty effective. The problem with<br />

mass attacks is that once you’re inside the node, alliances tend to<br />

fall apart quickly—different hackers want different things, and they<br />

sometimes end up fighting each other and node security at the same<br />

time. Hey, you know what they say about trusting criminals …<br />

pHiSHing<br />

While hacking your way into a system is one way to gain access,<br />

it’s often loud and noisy—the Matrix equivalent of breaking<br />

the glass and reaching through the hole to unlock the door while<br />

hoping you haven’t set off any alarms. A quieter, stealthier way is<br />

to look under the mat for a key first—or in Matrix parlance, get<br />

a passcode and access a legitimate account. Getting passcodes or<br />

other personal data off of a mark is called phishing.<br />

When you go phishing you need a lure or bait—something to<br />

entice the mark or open up a line of dialogue with them. Common<br />

phishing lures include an online store or e-mailed offer. A false online<br />

store (also called a phishing trap) often acts just like a real one, displaying<br />

goods and then taking customer information—including their<br />

identities, contact numbers, and shipping addresses—so that you can<br />

deliver the product. Phishing lures can also include viruses and other<br />

malware that infect customers as they come in, a good way to snag<br />

passcodes. Trojans are particularly easy to use if you can disguise them<br />

as a “free trial offer” of a new AR software or something like that.<br />

> If you don’t mind the cost, the site can even be functional—I know<br />

one hacker that started out making an online organic jams distributor<br />

and made so much honest cred from passing traffic that she got<br />

out of hacking altogether. Of course, she had to apply for business<br />

licenses and the like.<br />

> Mr. Bonds<br />

E-mail phishing attempts (line casting) are often caught by<br />

spam filters or discarded out of hand because they don’t interest the<br />

mark. Personally, I like to combine the phishing lure and line casting<br />

by setting up a fake site geared toward the mark’s interests and<br />

then sending a coupon or introductory offer to them. Naturally, this<br />

requires some knowledge of the mark and their interests.<br />

> A phishing lure can also be used to set up a botnet; you just load a hidden<br />

bot on every “customer” that enters the node to browse or shop.<br />

> Glitch<br />

Once you have their personal and financial data (which pretty<br />

much means their SIN number and authorization on their online<br />

bank accounts), you can clean them out—which is where a lot of<br />

phishers get caught. It’s one thing to duplicate a charge for a meal and<br />

make it look like the restaurant deducted the cost twice, but it’s something<br />

else again to blow somebody’s life savings on a piece of gear and<br />

then have it mailed to you. Keep in mind that any online purchases<br />

you make can be tracked back to you. Smart phishers will siphon off<br />

some cred to a certified credstick and then disappear with it.<br />

More sophisticated phishers target megacorps and financial<br />

institutions, often using a lot of social engineering to masquerade<br />

as someone who would legitimately have access to the (usually very<br />

well protected) personal or financial data. Theoretically you could<br />

Unwired<br />

set up a bank or other financial institution as a big phishing lure,<br />

but I’ve never heard of anyone that managed it.<br />

> It’s difficult to pull off because banks, credit unions, and non-bank<br />

financial service institutions have a lot of regulations, even in the most<br />

unregulated parts of the world (I’m looking at you, Carib League). Still,<br />

more than a few venerable financial institutions began as phishing<br />

lures until the owners and operators realized they could milk ten or a<br />

hundred times more nuyen out of a steady clientele than they could<br />

ever take from a single megacorp. And then there’s the handful of<br />

orgs that were bought out by the Mafia and the Yakuza.<br />

> Mr. Bonds<br />

deniaL of Service<br />

Denial of Service (DOS) attacks are proof that ancient hacker<br />

philosophy never goes out of style (though it may fall behind the<br />

tech curve). DOS attacks are about locking a user out of their commlink<br />

or terminal, or more often preventing a node or commlink<br />

from accessing the rest of the Matrix by flooding it with incoming<br />

connections. The how and the why might change each time, but<br />

the basic goal is the same—denying someone Matrix service.<br />

The key to most DOS attacks is overloading the target with<br />

traffic, with botnets being the weapon of choice. A hacker with<br />

a big enough botnet can inundate the target with data requests,<br />

connection requests, and other forged signals, locking out other<br />

incoming traffic. Spiders and IC can try to filter out the bot traffic<br />

or spoof their node’s access ID, but sheer numbers usually swing<br />

things in the botnet’s favor.<br />

A DOS attack on a commlink is a little more difficult, because<br />

you first have to perform a successful trace on the target icon; you<br />

can also lock someone out of their commlink or node with a little<br />

judicious editing of the connection filters, cutting them off from<br />

practically the entire Matrix. If you have the time and skill to mess<br />

with the accounts, you could even change all of the passcodes to<br />

keep the legitimate information technology personnel from fixing<br />

the problem right away.<br />

Of course, anything else that prevents people from accessing<br />

the target works too—crashing the operating system on a<br />

node, physical damage to a key server or optical trunk that supports<br />

traffic in and out of the node, switching the node to hidden<br />

mode—anything your dirty, clever little minds can think of.<br />

> I had a job a couple months back where my group was hired to do a<br />

24-hour DOS attack against the node of a corp that was going to release<br />

a new product online that day, but our hacker gal got sick and couldn’t<br />

perform. Ended up having to cut the optical trunk and aim a HERF rifle<br />

at it all day. Then the punks tried to switch to a satlink, and I ended up<br />

blowing that up with a missile! So much for a nice, quiet Matrix job.<br />

> Beaker<br />

ranSoMware<br />

By itself, a DOS attack is normally a means to an end, not an end<br />

in and of itself. Script kiddies may get their jollies locking some poor<br />

bastard out of his home terminal so he can’t turn in his homework<br />

or show up in his virtual classroom, but more often than not a DOS<br />

attack is part of the growing Matrix-based extortion phenomena.<br />

The idea behind Matrix extortion is simple: individuals, corporations,<br />

even governments need access to the Matrix and certain files.<br />

Simon Wentworth (order #1132857) 9<br />

89<br />

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!