Stoll, after returning his "borrowed" terminals, left a teleprinter
attached to the intrusion line in order to see and record everything the
hacker did. Stoll recorded
the hacker's actions as he sought, and sometimes gained unauthorized
access to military bases around the United States, looking for files
that contained words such as "nuclear" or "SDI". The hacker also copied password files and set up trojan horses
to find passwords. Stoll was amazed that on many of these high-security
sites the hacker could easily guess passwords, since many system admin
never bothered to change the passwords from their factory defaults.
Even on army bases, the hacker was sometimes able to log in as "guest"
with no password.
Over the course of this investigation, Stoll contacted various agents at the fbi,cia, nsa, and air force.
Since this was almost the first documented case of hacking Stoll was the first to keep a log on the hacker everyday, there was some confusion as to jurisdiction and a general
reluctance to share information.
No comments:
Post a Comment