Mapping The CIA Nonclassified Network 248
jeffy124 writes "A security firm Matta Security in London has mapped the CIA non-classified network. Using only legal and open sources, the company mapped topology of machines and even found networks otherwise closed to the public. The company never port scanned or probed the network directly. Among items they found were emails and phone numbers of sys admins and other employees. Amazingly, they did all this in two days."
I hope they also mapped out (Score:1, Funny)
Mapping was a planned leak! (Score:2, Funny)
TCD004
Portscanning? (Score:5, Insightful)
Re:Portscanning? (Score:2)
Re:Portscanning? (Score:5, Interesting)
One of my users decided to ping a DOD (department of defense) computer ... he pinged it, and a few days later we got an email from them asking us
A: if we have been compromised
B: if we hadn't please dont do it again.
The letter was very courtious, and explained they understand that pinging in itself is not illegal or not even unusual, the real point was to inform us that we may have been compromised (prolly a good idea).
A buddy of mine who works for the air force claims if you ping an air-force server, armed FBI agents will appear at your door quickly ... Obviously I am unwilling to test this :)
Re:Portscanning? (Score:4, Funny)
Re:Portscanning? (Score:3, Funny)
--
Graham
Re:Portscanning? (Score:2, Funny)
(Hell no! I'm not gonna do it! You do it! --No way, man! I ain't gonna do it! You do it!)
Re:Portscanning? (Score:5, Funny)
% ping hidden.airforce.mil
PING hidden.airforce.mil from 192.168.1.4 : 56(84) bytes of data.
64 bytes from hidden.airforce.mil: icmp_seq=0 ttl=57 time=20.871 msec fbi_agents_in=10
64 bytes from hidden.airforce.mil: icmp_seq=1 ttl=57 time=19.560 msec fbi_agents_in=9
64 bytes from hidden.airforce.mil: icmp_seq=2 ttl=57 time=20.497 msec fbi_agents_in=8
64 bytes from hidden.airforce.mil: icmp_seq=3 ttl=57 time=20.820 msec fbi_agents_in=7
64 bytes from hidden.airforce.mil: icmp_seq=4 ttl=57 time=19.732 msec fbi_agents_in=6
64 bytes from hidden.airforce.mil: icmp_seq=5 ttl=57 time=20.805 msec fbi_agents_in=5
64 bytes from hidden.airforce.mil: icmp_seq=6 ttl=57 time=19.830 msec fbi_agents_in=4
64 bytes from hidden.airforce.mil: icmp_seq=7 ttl=57 time=20.770 msec fbi_agents_in=3
64 bytes from hidden.airforce.mil: icmp_seq=8 ttl=57 time=19.781 msec fbi_agents_in=2
64 bytes from hidden.airforce.mil: icmp_seq=9 ttl=57 time=20.790 msec fbi_agents_in=1
--- hidden.airforce.mil ping statistics ---
10 packets transmitted, 10 packets received, 0% packet loss, 100% user loss
round-trip min/avg/max/mdev = 19.560/20.345/20.871/0.541 ms
Re:Portscanning? (Score:3, Funny)
Re:Portscanning? (Score:4, Funny)
I think you have the wrong domain name. (Well i know www is not hidden., but ill look into it for you!!
PING www.af.mil (131.84.1.31) from 192.168.83.206 : 56(84) bytes of data.
From h1-0.dtic.bbnplanet.net (4.1.1.254): Packet filtered
From h1-0.dtic.bbnplanet.net (4.1.1.254): Packet filtered
From h1-0.dtic.bbnplanet.net (4.1.1.254): Packet filtered
From h1-0.dtic.bbnplanet.net (4.1.1.254): Packet filtered
Yes actuall results. I wonder when i will get the email. (Yes i am an Admin on the domain, yes i am bored), or failing that visits from people in really bad suits. (Im lonely too, it will be nice to have someone to talk to!!) --- www.af.mil ping statistics --- 27 packets transmitted, 0 packets received, +4 errors, 100% packet loss
Re:Portscanning? (Score:2)
ping uss-dallas -one-ping-only
Re:Portscanning? (Score:4, Funny)
A massive, national mobilization of FBI agents was reported today by sources speaking on condition of anonymity. While officially the situation is classified, the source said there was a massive DOS attack of every major government site.
"We don't believe this to be the work of ametures." said the source, "The attack was highly organized - thousands of users, from all over the globe, using a special form of denial of service attack called the 'Slashdot Effect'."
The government has been keeping an eye on the hacker portal "Slashdot", at http://slashdot.org/, for quite some time, stating that it is always the best place to find out what the next big illegal thing is, whether it be irritating the MPAA, RIAA, or disrupting critical government networks.
President Bush is quoted as saying something inconsequental, ignorant, and stupid, as usual.
Re:Portscanning? (Score:4, Interesting)
Don't recall ever hearing from anyone about it. I even tried to send an explaination of the port-scan, but the published email I had bounced.
Re:Portscanning? (Score:3, Interesting)
Then, the site being mirrored was one that we'd developed for the air force, so I assume that they must've figured it was ok or maybe realized that it's bad form to monopolize most of our T1 for several minutes at a time and not felt like pushing the issue...
I'm pretty sure that individual bases or however they're grouped each are alowed some leeway in their security implemntations, so they probably don't all track connection information down to each individual ping...
Re:Portscanning? (Score:2, Funny)
Re:Portscanning? (Score:3, Interesting)
>tell you first hand that even pinging will get you a
>letter from the agency you pinged.
I can assure you that this is NOT the case for us outside the US. I've been known to use www.af.mil as a test of connectivity / UDP / ICMP, and I've not seen a letter, an email or indeed any MIB.
Re:Portscanning? (Score:2)
Re:Portscanning? (Score:2)
good link on legality of port scanning (Score:5, Informative)
If you take the time to read it, there is a bunch of interesting stuff in it. Just do a page search for "port" and you'll get to the cool stuff.
Re:Portscanning? (Score:4, Informative)
This has already been done.
Hackers tools (Score:3, Insightful)
Re:Portscanning? (Score:2)
Read the Article!
Re:Portscanning? (Score:2)
Re:Portscanning? (Score:4, Insightful)
Re:Portscanning? (Score:2)
Social hacking (Score:1)
-Sou|cuttr
Original PDF Report (Score:5, Informative)
Exactly. It is the typical information that any sysadmin from the outside. The graphic diagramming the networking layout [computerworld.com] shows nothing remarkable.
You can seen the original report in PDF format here [trustmatta.com], with _all_ of the juicy details.
Which is funny, because the link is not directly accessable from the main site.
talk about security.
It's DMZ data I'm sure... (Score:2, Interesting)
Re:It's DMZ data I'm sure... (Score:2, Insightful)
Among items they found were emails and phone numbers of sys admins and other employees
This sounds really stupid of the CIA at the first glance, but if you think about it, the sys-admins were probably "email the webmaster!" links and the 'other employees' were probably officials that displayed their office numbers so the public could contact them. What a joke.
Web Logs (Score:4, Funny)
Always nice to know if the spooks are checking up on me. (Not that I would give them any reason to) [cpusa.org]
Re:Web Logs (Score:2, Interesting)
"You've got a mail bomb"
Re:Web Logs (Score:2)
Re:Hah. (Score:3, Insightful)
The point is, that anyone in the USA should be allowed to discuss the merits of any social/political system. For a long time, that discussion was cut off, and people who held a particular viewpoint (however absurd it might seem to us rational people) were fired from their jobs, spied on, and even imprisoned.
So what? (Score:4, Funny)
Simply knowing the names and e-mail addresses that Matta turned up would be enough for some social engineers to get the rest of the information necessary to mount an attack
Sorry, I don't buy that. "Hi, this is chuck, the webmaster. Can I have the names of our russian agents please?"
Post the article again when someone breaks in or actually finds classified info.
Re:So what? (Score:5, Insightful)
Besides, addressing this kind of issue "when someone breaks in" is too late. And it's important that the civilian be aware of and take an interest in problems in its government, police force, legal system, etc.
Re:So what? (Score:2)
Of all organisations that might be vulnerable to social engineering, I am least worried about the military.
In any case, if people only hire intelligent software engineers, no one will be able to social engineer anything. It's a concern, but real hackers who recognize the phrase "social engineersing" don't bother with crap companies, and the script kiddies who can do damage don't have voices deep enough to pass for an adult.
Re:So what? (Score:3, Interesting)
A small team of men managed to literally roll an airplane out the back gate of an Air Force base, primarily using social engineering tactics. This team, hired by the military, found that military security wasn't all that it was cracked up to be.
if people only hire intelligent software engineers, no one will be able to social engineer anything.
How does *that* follow? Many social engineering attacks get the user to hand over username and password, and if you can't check IP (think mobile users) then you've just lost. At best you can contain it to that user's files, but that still may be a severe security leak.
Re:So what? (Score:5, Insightful)
Second, do you really think the CIA uses username/password authentication for *anything*? Think smartcards, one time key generators, palm scanners, etc. I guarantee there isn't a single secure system you can get into without at least a token and a passphrase. The most secure systems require multiple authentications. Hello, we're are talking about the largest *inteligence* agency in world.
Re:So what? (Score:2, Interesting)
Re:So what? (Score:2)
Re:So what? (Score:2)
This is good advise to most businesses who don't think about it that much.
BUT, to be fair to the CIA they are one institution that is fully aware of and as far as humanly possible takes into account "social engineering" (or "humint") After all that is what they DO - it is EXACTLY how they gather information themselves and it is exactly how they expect their rivals to gather information on them. Yes, they are still human and as humans WILL still make errors that will disclose information, but then again it is the one institution in the world where you might never be sure whether what you got was real information or disinformation.
Fuckin' A! (Score:4, Funny)
I always find it amusing when people try to make the CIA/FBI/NSA out to be bumbling idiots. They're not perfect, but they are really f'ing good.
In fact, if someone brought that weak 'social engineering' their way, it wouldn't surprise me if they were logged, traced, then given a visit by a couple really solemn-looking men in bad suits and dark sunglasses that smelled like pistachios.
I dare even one of the cynical know-it-all people that read this board to try it. Be sure to post your results so we can laugh at your cornholing.
Knunov
Re:Fuckin' A! (Score:2)
I don't have to worry about this. Everybody knows I'm a respectable programmer. I even help my landlady take out the garbage. Besides, I know my rights.
Re:Fuckin' A! (Score:2)
This, class, is a perfect example of a "dangling participle." The numerous comments that follow it are themselves perfect examples of what paleontologists call "easy humor". Note how the monkeys almost instinctivly jump at the opportunity to mock the original poster's error, despire the fact that other such comments have already been made. It's almost as if they can't help themselves. But spring is approaching, so displays such as this are more common: even the lowly geek desires a mate. He therefore displays his prowess in the only way he knows how, specifically by ridiculing the intelligence of others, and, by contrast, promoting his own apparent intelligence.
- Rev.Re:Fuckin' A! (Score:2)
What else would you eat during a stakeout?
Knunov
Re:Fuckin' A! (Score:2)
I found something classified! (Score:2, Funny)
Re:So what? (Score:2, Informative)
Actually it's "Dave":
Central Intelligence Agency (CIA-DOM)
Information Services Infrastructure
Washington, DC 20505
Domain Name: CIA.GOV
Status: ACTIVE
Domain Type: Federal
Technical Contact, Administrative Contact, Billing Contact:
Wheelock, David E. (DEW1)
(703) 613-9840
DAVIDW@UCIA.GOV
Domain servers in listed order:
RELAY1.UCIA.GOV 198.81.129.193
AUTH100.NS.UU.NET 198.6.1.202
Record last updated on 31-Oct-01.
Dave?
Dave's not here, man.
No, it's me, Dave - let me in.
Dave's not here!
Re:So what? (Score:3, Informative)
I should have made this clear in my last post, and this is based on my experience in the military: The web-page flozies typically work in the public affairs departments. They could be abducted by aliens and no one would care much. The real IT people have nothing to do with "administering" web sites.
Maybe the CIA does things differently - but I doubt it.
Not that impressive (Score:5, Insightful)
If someone can get classified information from CIA via social engineering, I'd say someone needs to be retrained. These guys should be on the lookout for that at all times.
Re:Not that impressive (Score:2, Insightful)
Re:Not that impressive (Score:5, Insightful)
A few years ago, Archer-Daniels Midland actually did try to hire a few hookers to get some market information from a competitor. The plan got scrapped when nobody could keep a straight face at the thought of some lady of the evening moaning "f--- me! F--- me! Harder! What's your method for removing impurities from lysine? Oh, god, harder!"
But I agree with paiute. It's people who have information, and getting information means getting it from people. Sending them hookers who then blackmail them is one option-a US Marine assigned to our embassy in Moscow fell for that back in the 80's.
And a lot of people will talk just because. Rajid at the 7-11 (not flamebait-that's really his name), a half-dozen homeless guys, and a handful of "undocumented workers" who are just as happy that the gringo cop speaks Spanish and doesn't know INS' phone number like to talk about what goes on in one particular neighborhood, and that includes talking to cops who want to buy coffee at 3AM (mainly me) and as a result I know pretty much everything that happens within two blocks of that 7-11.
It's all about people, and knowing how to listen to them. If the CIA had the good sense to hire street cops, semi-experienced newspaper reporters, multilingual cabdrivers, and a very few really good clinical psychologists to send overseas, they'd be able to tell us what kind of lube Osama bin Laden uses when he has relations with his goats, whether Jiang Zemin really is a pedophile or if that's just office gossip, if there's another reason why Vladimir Putin is cranky this week, and where the communist guerillas in Colombia buy their cigarettes. The really REALLY good information-gatherers know that they need to talk to people instead of wasting money on techno-toys.
Re:Not that impressive (Score:2)
If the CIA had the good sense to hire street cops, semi-experienced newspaper reporters, multilingual cabdrivers, and a very few really good clinical psychologists...
They do. There are problems with this. I'll talk to my local cop, but most of the cops I know will NOT talk to the KGB, MI6 (or is it MI5?), or any other overseas spi agency knowingly. some will, but most will not. I have relatives in the military who tell me sensitive (unclassified) information that foreign goverments would like to know. I don't go repeating that information to just anyone.
Accually reporters are the easiest target, just buy a subscription to the local newpaper and read it.
The other problem is money. Getting the information is easy. However sortting out "John and Mary smith are proud to anouce their son's engagement..." from interesting stories takes trained men. (and that is before we get into stenography where the announcement is a coded message that looks legitmate) Sortting though all of it takes money. The computers the CIA plays with are expensive, (and congress loves it because it brings jobs to some community that builds the stuff), but once technology is bought you can use it for years at the cost of only electrisity. Compare that to the cost of paying someone every year to read newspapers, and spy reports, and it doesn't take long for a computer to pay for itself in the volumn of data it can process compared to what the person can. Of course a person sorting through the paper is probably better than a computer, but there are many newspapers, and most of the time none of the have anything of interest.
Re:Not that impressive (Score:2)
>Sure, they found some machine names that route mail.
>Big deal.
Ah, you've never done any pen-testing I see... the first stage of which is always information gathering. It's not unknown to be able to pick out the most vulnerable point of entry without a single packet passing from between yourself and the target.
Score One for the Silent Majority (Score:1, Interesting)
It doesn't have to be a large organization (Score:2)
Big deal! (Score:5, Insightful)
As for the email addresses and sysadmin names, I really don't think that's a big deal.
Guess we better stop posting our email addresses and names! And, god forbid, get rid of your business cards! And don't forget your whois information!!!!
If that's really an avenue to social engineering, then we're all in trouble.
Re:Big deal! (Score:2)
Only because of spammers and trolls. My email address is publicly available, well posted on Usenet and mailing lists, and evidently available on mnay spam lists. Of course, that is my spam trap email address.
My business email address is available via whois information, as well as PR records on the DNS servers that I set up/maintain. And, of course, on our website.
My personal email address that I wish to not receive spam on, alas, is priveleged knowledge, and is only known to a select few. Of course, it is available as the email address of the administrator of my subdomain, and is aliased to postmaster@my.subdomain.com. So there are ways of finding it. And it doesn't take an 3l33t h4ck0r, or the CIA, to do it.
wonderful (Score:2, Redundant)
Related Stories: Report warns of al-Qaeda's potential cybercapabilities
don't you just love when we do half the terrorists jobs for them then wonder how they pull off elaborate attacks?
Re:wonderful (Score:3, Funny)
don't you just love when we do half the terrorists jobs for them then wonder how they pull off elaborate attacks?
Yeah, they sure are helping the enemy.
The terrorists have connected to port 25, I repeat the terrorists have connected to port 25!!!!
PH34R MY SK1LLZ (Score:5, Funny)
nslookup -q=mx www.cia.gov
- m4tt4 s3cur1ty 1337 h4x0r
Never re-route CIA packets... (Score:4, Interesting)
Before his company got attached to the net, they were using an address of '11.*' for their internal computers, which included a number of Sun workstations -- some doing double duty as routers. For those of you who don't know, RFC 1918 officially designates 3 network ranges for this sort of work -- 192.168.*, 10.* and 172.16.0/12. 11.0 obviously doesn't fit in that range.
When they got their network attached to the 'net, they had to do a good deal of work to renumber all of their computers to have 'proper' IP addresses (either in their assigned block, or in an RFC1918 non-routing block).
Within an hour of connecting their box to the 'net, they got a rather brusque call from an intelligence agency official demanding to know why they were stealing his packets. They had to disconnect from the network and root around their network until they found (and removed) the errant subnet stub. It turns out that they had managed to miss one SUN with a second ethernet card that was no longer attached to an active subnet (but still routing to the stub subnet). This was back at a time when any SUN with two ethernet cards routed by default, and every machine ran routed(8) as a matter of course (much easier than having to do manual routing all the time!). It turns out that the route to the stub network had leaked out to the larger internet and poisoned the routing for a huge pool of machines.
When I teach networking, I use it as an example of why you should always use the proper non-routing addresses for internal networks.
(I just did a whois, and 11.0/8 is actually owned by the Defence Intelligence Agency, not the CIA. Not like there's a big difference for us civies.)
Meme... (Score:2, Interesting)
Taking the numbers from the diagram in the article, whois says:
Hewlett-Packard Company (NETBLK-HP19)
3000 Hanover Street
Palo Alto, CA 94304
US
Netname: HP19
Netblock: 192.81.0.0 - 192.81.255.255
Maintainer: HP
.
Hmm the CIA has 162.45.*.* assigned to them, I guess they aren't using it.
I hope the MiBs don't come knocking on my door now.
sendmail 8.8.8? (Score:2)
Re:sendmail 8.8.8? (Score:2, Insightful)
They have upgraded since that original version, however.
The latest Sendmail version for Solaris 2.5.1 was 8.8.8 plus a Sun patch, so hopefully they got rid of any and all potential problems [insecure.org].
MONOLINUX
Re:sendmail 8.8.8? (Score:2)
Hmmmm....Can you say honeypot [everything2.com] ?
Soko
governments and computer security (Score:2)
a constituency that howls about privacy one second and howls about security the next. how could the cia/ fbi have ever let september 11th happen! what a massive failure of intelligence. how dare the government propose a national id card/ that security guard frisk me/ have a shadow government in bunkers up and running. it's a conspiracy to rob us of our bill of rights i tell you!
plane hijacker mohammed atta getting his ins paperwork approved 6 months after september 11th. conflicting mission statements. layers and layers of legislation like legal sediment conflicting and overlapping and obfuscating the directives for an office. look at the org chart that tom ridge now oversees as part of the new homeland security office. it resembles a circuit board.
computer security is a flavor-of-the-month affair... savvy smurfing DoS exploits one month, code red worms the next... nimbleness, dexderity, and flexibility being the name of the game here.
so let's have a packet collision here between the nature of these two beasts. i think the government is screwed, basically. so how do you change the nature of big slow-moving government?
i'm not trying to be pessimistic. because i think after september 11th there is a lot of will to fix things. president bush said as much today when he commented that mohammed atta's paerwork coming through a few days ago is completely inexcuseable on the part of the ins.
i'm just wondering how you change the nature of this beast, because it will, it has to, change.
Anyone else notice the Lotus Domino Server (Score:5, Interesting)
Why you may ask?
Because Lotus Notes and Lotus Domino is the only mail product that gives email administrators zero access to information within mail files. Each Notes database has an access control list, and you can specify who's on it. The mail server can have "depositor" access, which means it can only place information inside the database. The database can also be encrypted so that only the server can read it -- meaning someone has to steal a copy of the database itself off of the file system, in order to have a chance at decryption.
Re:Anyone else notice the Lotus Domino Server (Score:5, Informative)
Little known fact: The password entry box you get when logging in to a domino client/server setup with the 4 little hieroglyphs, is a CIA-requested add-on. That and the random amount of X's you get when you punch in the password.
Also, stealing a copy of the database will not help you if persistent ACL's were set up.
Other nice features of Domino is that you can have multiple level of access within each documents, meaning that group XYZ would have read access to the entire document, while group XY would only get 2/3rd of the forms in it, and group X would get only 1/3rd of the forms within the document.
Reasons why they're not using Exchange ? Well... Exchange did never get its security clearance...
Re:Anyone else notice the Lotus Domino Server (Score:3, Interesting)
You *can* disable this, however, by setting up password recovery within Domino, which I recommend that ALL Domino admins do. Then it requires anywhere from 2 to (I think) 4 different ID's to enter a recovery password, which will then recover the user's password.
Domino/Notes also is interesting in that your password is never sent over the wire, encrypted or otherwise. Your machine gets a copy of about a 2K $user.id file, which contains your authentication certificate to the Domino server. Your password identifies to your certificate that "I am Davitt J Potter/CIA/GOV/US." The Notes client then sends the certificate info to Domino, which then checks to make sure that certificate was generated by the Domino server, and is still a valid certificate. (Domino servers can set certificate expirations, so even if your password is valid, your certificate may be expired.)
I found Domino to be a really nice enterprise level email solution; I only wonder why it isn't used more?
Re:Anyone else notice the Lotus Domino Server (Score:2)
Marketing.
Re:Anyone else notice the Lotus Domino Server (Score:3, Informative)
This won't work if the mail is encrypted, because if you create another ID with the same name, the public/private key combo is different. Therefor the only thing you may be able to read is the subject line. The message body will have been encrytped (you can encrypt the DB itself, and you can specify that all emails you receive are encrypted too).
Re:Anyone else notice the Lotus Domino Server (Score:2, Insightful)
Version 5.0 of the client still can't handle Daylight Savings Time! If it crashes (and it does) you've got to manually kill the process nlhdeamon.exe to restart. You do not want your helpdesk handing out instructions like that...
Easier than that... (Score:2)
On top of that at least two folks have created code that's supposed to unlock the ID file. One by substituting the hash that's compared by the password dialog in memory with one that's created by a seperate application. That code isn't distributed depsite promises to release. The second piece of code is a bit shakier but is supposed to be able to backdoor the ID. These two groups are speaking to one another but as of yet I've not seen any results. http://www.falling-dominos.com/ was one of the sites that was working this but refuses to release code for fear of the DMCA. I want this code if anyone has it..
Lastly, there's code out there to dictionary attack the ID file. Some work would no doubt yield brute force code but source hasn't been released for this tool. I might know how it works though
Overall though - Notes is damned secure compared to the MSFT crap that's out there. R6 is looking pretty good and the RC1 beta has been running on my server\workstation for several months now rock solid. Lotus came up witha workable PKI long before X509 seemed to have caught on. Port encryption and all sorts of nice goodies too. I happen to like the client and its dirt easy to build simple apps. Even workflow apps aren't hard to build and publishing to the WEB is no biggie unless you get really tricky. My home server is running Notes and except for the mile long URLs I find it pretty friendly...
Re:Anyone else notice the Lotus Domino Server (Score:2)
Keywords here are : AIR FORCE and NON-SECURE.
Air Force and CIA, last time I checked were two very different branch... One being Army, the other one being government intel. (but then again, I'm a canuck, so what do I know.).
I'm pretty sure that for secure comms, Air force probably uses some weird mainframe based home-brewed system, and stays far far far away from Ms Exchange... I would not even be surprised that they still use some kind of point to point paper based teletype for all the really important stuff. I would not trust nuclear launch orders to a computer transmission... I guess they would not either...
Actually Notes can prevent Admin snooping... (Score:2)
Admin keeping copies of your ID? No problem, change your password and the ncreate a private encryption key. Encrypt that which you find too sensitive to share and smile. The admin is now locked out without breaking your IDs password or using a tool to circumvent the IDs password. Those tools aren't publicly available..
Done right it's quite possble to have privacy using Notes. Oh, use port encryption too
Network interface cards? (Score:4, Informative)
Looks like someone got a little carried away expanding acronyms. The NICs used by Matta were probably network information centers rather than network interface cards.
basic network enumeration... (Score:2)
Re:basic network enumeration... (Score:2)
Morons (Score:2, Funny)
They exist.
They work in buildings.
They have barbed wire around their compound.
Humans go in and out at various times during the day.
Using this valuable information and the logic of this silly article, I *could* mount a tactical strike against CIA headquarters!
Maybe I could run into a CIA employee at the butcher's and make friends and learn his home phone number. Shit! I've just *hacked in* to the CIA. Ph34r my skillz.
Using legal tools != legal (Score:2)
Whether their IP address list is classified, I cannot say... probably not, but I wouldn't like to bet.
I'd only question the Zone Transfer... (Score:2)
Re:Using legal tools != legal (Score:2)
> We laugh at the CIA in a country that has real things to fear -
Skylarov probably laughed the same way...
Uhm...K. (Score:2)
This sounds dangerous to people not in the know, and may make a good article to read but I don't see an issue here. Some of it is very questionable. How do you really know they are running Solaris? That wouldn't be hard to mask.
Ever heard of stripping headers? (Score:3, Insightful)
Jesus I don't run a covert espionage agency and I at least do that at our company. Hell I even proxy requests to private servers from an apache server in the DMZ.
Isn't this just basic network security?
Re:Ever heard of stripping headers? (Score:2)
Would that be in the Demilitarized Zone??
Wana know more? (Score:3, Informative)
http://iase.disa.mil/eta/index.html [disa.mil]
Nice to see Unix (Score:2)
Significance? (Score:3, Interesting)
What's next? I would think that if you were not able to map the CIA's unclassified public network than they must have some sort of major DNS problem.
There is absolutely no significane to this news story other than organizations who maintain a publically accessible web site with such services as e-mail and a web site must have a logical network structure to deliver said services. The CIA is no exception.
it's not that hard. (Score:2, Interesting)
Port scanning (Score:3, Insightful)
What I want is a kernel module to defeat port scanning. Whenever a remote tries to connect to a port that isn't bound, the module kicks in, accepts the connections, and doesn't do anything, or echos the incoming data, or sends random data, or behaves like a web/ftp/etc server, or a combination of the above.
If most computers used this, wouldn't port scanning become impractical?
Would there by any harm in it?
Re:Port scanning (Score:2)
Who's Socially Engineering Whom? (Score:2, Interesting)
The CIA's actual network defenses never even came
into play. Because of the CIA's reputation, the
security firm didn't dare portscan, or test the
numbers, names, and addresses they got.
Obviously the CIA are the ones who really employed
social engineering in this case.
Cisco 4000 Series Router (Score:2)
Why is this significant? Well, as was recently [slashdot.org] pointed out the 4000 series line cards contain a class III [slashdot.org] led transmit/receive status indicator, which makes it possible to sniff traffic off of the interface optically from a distance. Hope the CIA has some extra black tape handy.
got their emails, huh? (Score:2, Funny)
I hope those guys like pr0n and are looking for a good mortgage rate.
Re:Makes for interesting headlines, but not much e (Score:2)
Re:Makes for interesting headlines, but not much e (Score:2)
Also ILOVEYOU was found on the class system, that BTW runns MS lookout and exchange 5.5
What class system are YOU talking about?! (Score:2)
Anyway, from what he said Exchange was NOT welcomed. Why would they bother to tell people that, present on it, run Notes on their Unclass server, and then run Exchange inside? You must be talking about another network....
Re:Google's in the news (Score:2)
Yes,