A Child Hacks a
Corporation
Summary:
GRC.com is a website of a research corporation that has been
attacked by a thirteen years old hacker/ attacker. The website CEO is Steve
Gibson, who realized the attack on the evening of 4th March 2001.
The internet of the corporation was down unexpectedly. When the CEO of the
website realized that the hacker was a thirteen year old child, he immediately
took action and put all his efforts together to stop and capture him. He
communicated with the hacker and through communication with him, he was able to
find the hacker and stop his harmful actions against the corporation.
n
Windows PC’s were unable to send TC PSYN packets
to pot 80 and were only able to flood them with UDD and LCMP packets (Which
could be temporarily ignored)
ISP was able to filter their receipt of the malicious
packets before they were able to reach their T1 trunks. TCP – based services (web/
FTP news) offered even under continuing attack.
n
There were 474 attacks by Windows PC’S and a
machine per piece which means 474 machines with multiple domains.
A zombie is a computer that a remote attacker has accessed
and set up to forward transmissions (including spam and viruses) to other
computers on the Internet. The purpose is usually either financial gain or
malice. Attackers typically exploit multiple computers to create a botnet ,
also known as a zombie army.
n
Hackers referring to various lists of “cable
Bots” and saying things like “ Heh, but now many of this Bots are cable?” are a
remote control of Zombie.
n
Eight machines used in the attack.
“ I hope it is
becoming clear to everyone reading this, that we can not have a stable Internet
economy while 13 year-old children are free to deny arbitrary Internet services
with impunity.
I agree with the statement.
n
A better security should be provided.
n
The Internet security intervention should be
prevented by putting a law for judging those people and giving them harsh
punishments.
Sub 7 Server: Grants the hacker
who is controlling the Zombie, the “ Zombie Master” - absolute control over his victim’s
machines.
Sub 7Server Torjan enables is monitoring every keystroke for
the purpose of capturing anything online
such as, passwords, cedit cards, eBanking …etc.