Sorry, No ads on this site.

H a c k e r N e w s N e t w o r k
08-15-00

Defaced Pages Archive

HNN Affiliates

Affiliate Resources

I Want My HNN

Write For HNN

HNN Privacy Statement

Who Is HNN?



1999 Year In Review










Freedom of the press is limited to those who own one.
- A.J. Liebling

 

Part IV: Now think about this...
==============================
Ask yourselves these questions:

-Can this really be done? The answer is yes. Yes yes yes. It has been done to a much smaller extent. Think of Melissa, think of the '88 worm. All of them were minor threats in comparison with this.

-Why is this then different from what we have seen before?
The major difference here is that this Trojan/virus will initiate communication. This means it can bypass firewalls, as firewalls are generally build to block incoming traffic, while allowing (some) outgoing traffic. This Trojan/virus will also have the ability to communicate with its controller (and even inter-virus communication is possible). The virus/Trojan is basically a streamlined, neatly packaged combination of all the bad things that are floating around the 'net today.

-how much "smarter" can this thing be made?
Much smarter. I am not the brightest person on earth, and I can come up with something like this. There are many of us out there, smarter, and brighter...and with the resources to create this monster.

-what would be the implications of this?
It could mean that the Internet would change, to such an extent that it will no longer be possible for companies to use it as a commercial tool. Back to the old days of vast open, purely academic networks.

-Is the IT security world ready to handle such an onslaught?
Not really. When this Trojan/virus reaches secondary infection phase, it can spread to millions of hosts within hours, and disconnection of hosts could lead to disaster. Remember that the rate at which the anti virus could spread is just as fast, or slower than that of the virus.

-what would happen if this were wired into an existing stable reputable product?
I rather not think of it...

-How do we know that there is not something like this out there?
We don't. Isn't it strange that our friends at cDc and L0pht haven't released something like this? Or have they? Hmmm?

-why have you written this?
I think that a monster the likes of this is about to be released. It will be only a question of time before a thing like this will happen. The only thing keeping it from happening is that the people with skills to write such an application is not willing to do so, since they, as experts, know the implications.

Taking it one step further (the really nasty angle)
===========================================
Now lets see...what would happen if the AI was to encrypt *.DOC *.CPP, *.C files and store the keys on the web servers (encrypted under a masterkey)? I can see it now - "buy your code & documents back at our special discount price"...

Last words & thanks
====================
And you thought all we do in South Africa is dodge the elephants... My sincere thanks goes out to Charl for his ideas and for writing part I.

-----------end---------------


Go back to Part I: Background

buffer overflow

c o n s
a b o u t
p r e s s
s u b m i t
s e a r c h
c o n t a c t



Today
Yesterday
08/13/00
08/12/00
08/11/00
08/10/00
08/09/00
08/08/00
   
 



These pages are Copyright © 2000 Hacker News Network All Rights Reserved.