FAQ and Guide to Cracking
I am going to describe the methods and strategies used to access various UNIX hosts among the internet unauthorizedly. This guide will not teach you how to hack, neither do you have to be a hacker to use the techniques described here. Hacking means finding your own way to do it, and finding new approaches to accomplishing something. I am only going to supply you with one possible approach to cracking.
Thursday, July 26, 2001
Commonly overlooked audit trails on intrusions
This is my attempt of compiling a 'top list' of audit trails that
are being left after intrusions where the intruders try to cover their
tracks but don't do a good job. To put it short, there are actually
a lot of audit trails on a normal UNIX system, which can almost all
be overcome, but with some effort, that most intruders evade.
This is my attempt of compiling a 'top list' of audit trails that
are being left after intrusions where the intruders try to cover their
tracks but don't do a good job. To put it short, there are actually
a lot of audit trails on a normal UNIX system, which can almost all
be overcome, but with some effort, that most intruders evade.
Protecting against the unknown - improving information security for the future
This paper attempts to define the problem and answer the question:
What pure or applied technical measures can be taken to protect the Internet against future forms of attack?
This paper attempts to define the problem and answer the question:
What pure or applied technical measures can be taken to protect the Internet against future forms of attack?
Wednesday, July 25, 2001
Inside the E-Mails of a Spy
The following are representative samples of Robert P. Hanssen's thinking on various issues, from the breakdown in security at DOE facilities and Clinton-administration bungling to Israeli intelligence operations to Fidel Castro and the Elian Gonzalez case. All are taken from a collection of Hanssen's e-mails.
The following are representative samples of Robert P. Hanssen's thinking on various issues, from the breakdown in security at DOE facilities and Clinton-administration bungling to Israeli intelligence operations to Fidel Castro and the Elian Gonzalez case. All are taken from a collection of Hanssen's e-mails.
Inside the E-Mails of a Spy
The following are representative samples of Robert P. Hanssen's thinking on various issues, from the breakdown in security at DOE facilities and Clinton-administration bungling to Israeli intelligence operations to Fidel Castro and the Elian Gonzalez case. All are taken from a collection of Hanssen's e-mails.
The following are representative samples of Robert P. Hanssen's thinking on various issues, from the breakdown in security at DOE facilities and Clinton-administration bungling to Israeli intelligence operations to Fidel Castro and the Elian Gonzalez case. All are taken from a collection of Hanssen's e-mails.
STUDY MANUAL COUNTER INTELLIGENCE PROLOGUELN324
The purpose of this booklet is to present basic information on the mission and activities of Counter Intelligence. But, with the understanding that the primary mission is to support the commanders of the armed forces. This booklet is dedicated to the concepts of Counter Intelligence in relation with its functional areas, the application of these functions, and a specific dedication and instructions on how to apply these functions. The terms "special agent of Counter Intelligence" (SA) refers to all those persons who conduct and contribute to the handling and gathering of information of the
multi-disciplinary intelligence of the hostile services. This booklet is
primarily oriented at those persons involved in the control and execution of the operations of CI. In like manner, this booklet has a very significant value for other members of the armed forces that function in the areas and services of security and other departments of intelligence.
The purpose of this booklet is to present basic information on the mission and activities of Counter Intelligence. But, with the understanding that the primary mission is to support the commanders of the armed forces. This booklet is dedicated to the concepts of Counter Intelligence in relation with its functional areas, the application of these functions, and a specific dedication and instructions on how to apply these functions. The terms "special agent of Counter Intelligence" (SA) refers to all those persons who conduct and contribute to the handling and gathering of information of the
multi-disciplinary intelligence of the hostile services. This booklet is
primarily oriented at those persons involved in the control and execution of the operations of CI. In like manner, this booklet has a very significant value for other members of the armed forces that function in the areas and services of security and other departments of intelligence.
When Secrets Crash
When a passenger airliner crashes, investigators from the National Transportation Safety Board quickly arrive on the scene to try to determine what went wrong. Press conferences and press coverage follow. The NTSB Web site notes that media are briefed at least once a day by one of the board members accompanying the investigating team and that a public affairs officer maintains contact with the media. Viewers of the nightly news often see aerial images of the crash site. The flight and airplane involved will be precisely identified by the airline and NTSB. Eventually, the public can expect a detailed report on the conclusions.
Things can be very different when the crash involves a military aircraft--particularly if it is an airplane whose existence or mission the United States has not yet acknowledged or that carries particularly sensitive equipment. Over the years, a variety of secret intelligence and military aircraft have crashed, and the specifics of US government responses have varied--sometimes as the result of the different circumstances of the crashes, other times as the result of different rules for dealing with the press queries concerning classified programs. However, preserving secrecy has been a constant objective.
When a passenger airliner crashes, investigators from the National Transportation Safety Board quickly arrive on the scene to try to determine what went wrong. Press conferences and press coverage follow. The NTSB Web site notes that media are briefed at least once a day by one of the board members accompanying the investigating team and that a public affairs officer maintains contact with the media. Viewers of the nightly news often see aerial images of the crash site. The flight and airplane involved will be precisely identified by the airline and NTSB. Eventually, the public can expect a detailed report on the conclusions.
Things can be very different when the crash involves a military aircraft--particularly if it is an airplane whose existence or mission the United States has not yet acknowledged or that carries particularly sensitive equipment. Over the years, a variety of secret intelligence and military aircraft have crashed, and the specifics of US government responses have varied--sometimes as the result of the different circumstances of the crashes, other times as the result of different rules for dealing with the press queries concerning classified programs. However, preserving secrecy has been a constant objective.
U.S. News: China: How big a threat? (7/23/01)
It was originally created by the U.S. Air Force and is now entrusted with some of the U.S. government's most sensitive and secretive national security studies. So executives at Rand, a think tank based in Santa Monica, Calif., were stunned when intelligence officials called on June 8 to say they were firing Rand from a classified project ordered by Congress to assess China's future military capabilities. The National Intelligence Council (NIC), a group that reports directly to CIA chief George Tenet, concluded that Rand was failing to do its job adequately and decided it needed to hire another contractor.
It was originally created by the U.S. Air Force and is now entrusted with some of the U.S. government's most sensitive and secretive national security studies. So executives at Rand, a think tank based in Santa Monica, Calif., were stunned when intelligence officials called on June 8 to say they were firing Rand from a classified project ordered by Congress to assess China's future military capabilities. The National Intelligence Council (NIC), a group that reports directly to CIA chief George Tenet, concluded that Rand was failing to do its job adequately and decided it needed to hire another contractor.
Fight over Euro-intelligence plans
The sudden closure of one of the world’s largest spy stations is a potential harbinger of confrontation between the U.S. and Germany.
The sudden closure of one of the world’s largest spy stations is a potential harbinger of confrontation between the U.S. and Germany.
Subscribe to:
Posts (Atom)