Monday, April 30, 2012


      A Child Hacks a Corporation

Summary:

GRC.com is a website of a research corporation that has been attacked by a thirteen years old hacker/ attacker. The website CEO is Steve Gibson, who realized the attack on the evening of 4th March 2001. The internet of the corporation was down unexpectedly. When the CEO of the website realized that the hacker was a thirteen year old child, he immediately took action and put all his efforts together to stop and capture him. He communicated with the hacker and through communication with him, he was able to find the hacker and stop his harmful actions against the corporation.


2.

n  Windows PC’s were unable to send TC PSYN packets to pot 80 and were only able to flood them with UDD and LCMP packets (Which could be temporarily ignored) 

ISP was able to filter their receipt of the malicious packets before they were able to reach their T1 trunks. TCP – based services (web/ FTP news) offered even under continuing attack.



n  There were 474 attacks by Windows PC’S and a machine per piece which means 474 machines with multiple domains.


3.

A zombie is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. The purpose is usually either financial gain or malice. Attackers typically exploit multiple computers to create a botnet , also known as a zombie army.



n  Hackers referring to various lists of “cable Bots” and saying things like “ Heh, but now many of this Bots are cable?” are a remote control of Zombie.



n  Eight machines used in the attack.



 4.



“ I hope it is becoming clear to everyone reading this, that we can not have a stable Internet economy while 13 year-old children are free to deny arbitrary Internet services with impunity.



I agree with the statement.



n  A better security should be provided.

n  The Internet security intervention should be prevented by putting a law for judging those people and giving them harsh punishments.




5.

Sub 7 Server: Grants the hacker who is controlling the Zombie, the “ Zombie Master”  - absolute control over his victim’s machines.



Sub 7Server Torjan enables is monitoring every keystroke for the purpose of capturing anything online  such as, passwords, cedit cards, eBanking …etc.