Stoll, after returning his "borrowed" terminals, left a teleprinter 
attached to the intrusion line in order to see and record everything the
 hacker did. Stoll recorded
 the hacker's actions as he sought, and sometimes gained unauthorized 
access to military bases around the United States, looking for files 
that contained words such as "nuclear" or "SDI". The hacker also copied password files  and set up trojan horses 
 to find passwords. Stoll was amazed that on many of these high-security
 sites the hacker could easily guess passwords, since many system admin 
 never bothered to change the passwords from their factory defaults. 
Even on army bases, the hacker was sometimes able to log in as "guest" 
with no password.
Over the course of this investigation, Stoll contacted various agents at the fbi,cia, nsa, and air force.
 Since this was almost the first documented case of hacking Stoll was the first to keep a log on the hacker everyday, there was some confusion as to jurisdiction and a general 
reluctance to share information.
 
No comments:
Post a Comment