31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

April 2011, while he and Sabu were still discussing <strong>the</strong> idea. “<strong>We</strong> figured it’d be too far to call ourselves a hacking team with a cheesy<br />

banner, so we haven’t decided much.”<br />

Kayla had been flitting about online, so <strong>the</strong>y created an IRC channel called #Kayla_if_you_<strong>are</strong>_here_come_in_this_channel. Once Kayla<br />

came back, she said she was interested, and <strong>the</strong> three <strong>of</strong> <strong>the</strong>m started throwing ideas around. One was to set up a new IRC network for<br />

Anonymous, since Ryan’s leak in April had turned hundreds <strong>of</strong> users <strong>of</strong>f its channels. Detractors had bombarded <strong>the</strong> network with DDoS<br />

attacks, and while regular visitors had dwindled, <strong>the</strong> number <strong>of</strong> people claiming to be operators had swelled to forty. With AnonOps now so<br />

top-heavy, <strong>the</strong>re was chaos in nine different “command” channels, leader-<strong>of</strong>-leader channels, and secret channels to talk about o<strong>the</strong>r<br />

operators. The network was about to crash under its own weight, and Anonymous needed a safe, organized place to meet. But by early May,<br />

<strong>the</strong> AnonOps operators had got it toge<strong>the</strong>r. They had whittled <strong>the</strong>ir servers down from eight to two, and <strong>the</strong>ir operators from forty to eight.<br />

An IRC network now looked less necessary.<br />

“I probably would have quit if we hadn’t talked so much and ended up getting Kayla back,” Topiary would say many months later. “In a<br />

way I wish Sabu hadn’t trusted me so much.” In a few days, AVunit came back from his break and joined <strong>the</strong> group too. There were now<br />

four <strong>of</strong> <strong>the</strong> old team back toge<strong>the</strong>r who were interested in doing something big—<strong>the</strong>y weren’t sure what exactly—to reinspire Anonymous.<br />

There was no turning back now.<br />

One late morning, during a period when <strong>the</strong> team was still mulling over what <strong>the</strong>y could do toge<strong>the</strong>r, Topiary got out <strong>of</strong> bed, got on his<br />

laptop, and saw Sabu online, along with Kayla. It must have been about five in <strong>the</strong> morning in New York.<br />

“Guys I was up all night looking at sites to go after,” Sabu said. “And I found this big FBI site.” Topiary’s breath quickened for a moment.<br />

“I’ve got access to it,” he added.<br />

Sabu <strong>the</strong>n pasted a long list <strong>of</strong> around ninety usernames and encrypted hashes (which corresponded to <strong>the</strong>ir passwords) from a website<br />

called Infragard. The list <strong>of</strong> names represented half <strong>the</strong> site’s user base. Topiary and Kayla immediately started trying to crack <strong>the</strong>m, excited<br />

by <strong>the</strong> prospect <strong>of</strong> “hacking <strong>the</strong> FBI.” Just a few minutes in, Topiary Googled Infragard, and he realized <strong>the</strong>y were dealing with a nonpr<strong>of</strong>it<br />

affiliate <strong>of</strong> <strong>the</strong> FBI, not <strong>the</strong> organization itself. He thought briefly about asking how Sabu had found <strong>the</strong> security hole or pointing out that it<br />

wasn’t exactly a “big FBI site.” But he didn’t want to dampen <strong>the</strong> team’s excitement.<br />

All <strong>the</strong> users had been verified by <strong>the</strong> FBI to gain access and all worked in <strong>the</strong> security field; some were even FBI agents. Yet <strong>the</strong>ir<br />

password choices were questionable, at best. One <strong>of</strong> <strong>the</strong> users had used “shi<strong>the</strong>ad” as a password for everything online; ano<strong>the</strong>r had<br />

“security1.” Only about a quarter <strong>of</strong> <strong>the</strong> users had passwords <strong>the</strong> team couldn’t crack. It is a general rule in IT security that any password that<br />

isn’t a combination <strong>of</strong> letters, numbers, and symbols is weak. It is not particularly hard to memorize “###Crack55##@@” or “this is a<br />

password 666,” but both <strong>of</strong> <strong>the</strong>se would be extremely difficult to crack. (The hardest passwords to decipher <strong>are</strong> phrases, which <strong>are</strong> also easier<br />

for password holders to remember.)<br />

After someone downloaded <strong>the</strong> entire database <strong>of</strong> users and <strong>the</strong>n converted it into a simple text file, Sabu loaded <strong>the</strong> 25 percent <strong>of</strong><br />

password hashes that <strong>the</strong> team couldn’t crack into <strong>the</strong> don’t-ask-don’t-tell password cracking service he’d used for HBGary Federal,<br />

HashKiller.com. Sometimes kids used <strong>the</strong> site to send encrypted messages to one ano<strong>the</strong>r, with <strong>the</strong> challenge to crack <strong>the</strong>m. When nefarious<br />

<strong>hacker</strong>s broke into <strong>the</strong> user base <strong>of</strong> a website, <strong>the</strong>y would typically dump all <strong>the</strong> so-called MD5 hashes into a database and start cracking <strong>the</strong><br />

easy ones first, <strong>the</strong>n let HashKiller’s forum users do <strong>the</strong> rest.<br />

An MD5 hash was a cryptic language that corresponded to words or files, and it typically looked like this:<br />

11dac30c3ead3482f98ccf70675810c7<br />

This particular string <strong>of</strong> letters and numbers translated to “parmy,” so <strong>the</strong> result on <strong>the</strong> site would look like:<br />

11dac30c3ead3482f98ccf70675810c7:parmy<br />

That information would <strong>the</strong>n be stored in HashKiller’s database, so if anyone tried to crack <strong>the</strong> password “parmy” and had <strong>the</strong> MD5 hash, he<br />

could do it instantly. The result from Hashkiller.com would look like this:<br />

Cracking hash: 11dac30c3ead3482f98ccf70675810c7<br />

Looking for hash…<br />

Plain text <strong>of</strong> 11dac30c3ead3482f98ccf70675810c7 is parmy<br />

It was that simple. This was why it was a bad idea to use single-word passwords, like “parmy” or—even worse, because it is commonly<br />

known—“shi<strong>the</strong>ad.” Each password always had <strong>the</strong> same MD5 hash. And once it was in HashKiller.com, everybody knew it. A lack <strong>of</strong><br />

context kept things relatively secret: everyone could see <strong>the</strong> hashes and cracked passwords in plaintext but nothing else. Using <strong>the</strong> site was<br />

free, and Sabu had only to sit back and wait for <strong>the</strong> passwords to be cracked by volunteers.<br />

Once someone cracked <strong>the</strong> admin’s password, <strong>the</strong> surprisingly easy “st33r!NG,” Sabu created a web page that he secretly attached to <strong>the</strong><br />

website for Infragard Atlanta, known as a shell. It was <strong>the</strong> same sort <strong>of</strong> page that <strong>the</strong> site’s administrators would use to control its content,<br />

allowing him to add new pages or delete o<strong>the</strong>rs. The difference was that <strong>the</strong> admins knew absolutely nothing about Sabu’s page. Since <strong>the</strong><br />

page for <strong>the</strong> original control panel had been xootsmaster, Sabu named his new shell page /xOOPS.php. He could have just gone through <strong>the</strong><br />

main control panel since he had <strong>the</strong> right password, but that would mean clicking through a series <strong>of</strong> options and a long list <strong>of</strong> directories. The<br />

shell was a more simply designed page that made it quicker and easier to mess with things.<br />

The team lurked on <strong>the</strong> site for a few weeks while sitting on its entire username and password base: twenty-five thousand e-mails from <strong>the</strong><br />

personal accounts <strong>of</strong> <strong>the</strong> site’s users, a mixture <strong>of</strong> security consultants and FBI agents. Topiary and his friends had all <strong>the</strong>ir passwords, full<br />

names, and e-mails. If Topiary had been feeling malicious, he could have logged into <strong>the</strong> PayPal accounts <strong>of</strong> one <strong>of</strong> <strong>the</strong> more senior users and<br />

started splashing money all over <strong>the</strong> place.<br />

“That would be bad,” he said at <strong>the</strong> time.<br />

They had access that could let <strong>the</strong>m deface <strong>the</strong> site in seconds, but <strong>the</strong>y would wait it out. The crew was still feeling <strong>the</strong> heat from

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!