[Ti] Some one Hacked me!
Sambouka
sambouka at mac.com
Wed Jan 19 12:47:45 PST 2005
I found it funny that no one was up for the challenge :)
On Jan 13, 2005, at 5:08 AM, Chris Olson wrote:
> On Jan 12, 2005, at 1:46 PM, Robert Ameeti wrote:
>
>> And do please give a link showing me where the Mac was cracked in a
>> cracking contest. All the ones that I've heard about were not
>> cracked. And my opinion was in this case that Ray's computer was not
>> attacked by the experts capable of winning contests worth $10K or
>> more.
>
> I indeed agree that Ray's computer more than likely was not cracked.
> But never make the mistake of thinking Mac OS X is infallible. As
> shipped in it's default configuration it is indeed secure, usually
> more so than other Unices, but people use their computers for things.
> The computer does little good sitting there with the ethernet plug
> lying on the floor not plugged into the wall jack. If it has ports
> open and is running services on those ports, it can be cracked.
> Period. I don't care what it runs.
>
> In addition, I'm up for a challenge, and I'd like to prove it to you
> first hand.
>
> Firstly, those of us who specialize in, and like to play with cracking
> computers are *NOT* hackers, nor does your box get "hacked".
> "Hacking" is writing software.
>
> Place a "secret" text file in your user directory someplace named
> "secret.txt", the contents of which only you know. I don't want to
> know your user name (if the box has multiple users), nor where you put
> the file as long as it's in your user directory. Put your Mac on a
> DSL or Cable modem with a static IP that won't change for 48 hours.
> Connect it directly to the modem with the firewall on, with web
> sharing (http port 80), remote login (SSH port 22), and FTP access
> (FTP control port 21 and data port 20, plus non-privileged ports
> 1024-65535) turned on. Make certain Windows File Sharing and Personal
> File Sharing are turned off, along with all other services on the box
> except for the three mentioned above. Email me the IP address of the
> machine along with a waiver that gives express consent to me and an
> undisclosed number my colleagues to attack the box. We need the
> waiver to state an understanding on your part that this is not a
> criminal activity, that we may take root control of the target box
> over remote connection, and that we may modify some critical system
> utilities, including replacing the NetInfo database in the BSD
> subsystem in order to do so. We'll also need written consent from
> your ISP giving us permission to attack an IP address on a subnet
> owned by them. An email signed with your PGP key is sufficient for
> your written consent, the ISP will have to fax me their waiver.
>
> Give us a start time, and allow 48 hours continuous access to the box.
> To prove we broke in, one of us will email you the contents of your
> secret text file before the 48 hour time period expires, with complete
> step by step documentation of how we broke in. And we'll do it for
> fun. We won't expect any big prize for breaking in.
> --
> Chris
>
> _______________________________________________
> Titanium mailing list
> Titanium at listserver.themacintoshguy.com
> http://listserver.themacintoshguy.com/mailman/listinfo/titanium
>
More information about the Titanium
mailing list