UNIX-Linux güvenli, Windows güvensiz mi?

Kevin Mitnick en büyük hacker’lardan birisi. “Ghost in the Wires” adlı kitapta yaptıklarını anlatıyor.

Mitnick’in kitabını okurken VAX VMS ve UNIX’in çeşitli türlerinde ne kadar rahat hareket ettiğini görüyoruz:

Bu sistemlere herhangi bir şekilde girdikten sonra, sistemlerin çeşitli açıklarını kullanarak kendisini yetkili kullanıcı yapması en çok 1-2 dakikasını alıyor.

Kitaptaki olaylar 1980’lerin sonunda ve 1990’larda geçiyor. Dolayısıyla UNIX-Linux sistemlerinin artık bu tür açıklardan arındığını düşünmek normal olabilir.

Ama daha geçtiğimiz yıl ortaya çıkarılan Linux Sudo açığı durumun tam böyle olmadığını da gösteriyor.

Windows’un güvensiz olduğu, UNIX-Linux türevlerinin güvenli olduğu iddiası tam bir efsane gibi duruyor.

Aşağıda Mitnick’in kitabından ilgili kısımları bulabilirsiniz. Kevin Mitnick hakkında da şu yazıyı okuyabilirsiniz:

http://muratyildirimoglu.com/makaleler/kevinmitnick.htm

Kitaptan Parçalar:

Sayfa 321:

By exploiting a flaw in a program called “rdist,” I popped root on his system…Using the “Point-to-Point” protocol, I logged into Sun’s “mercury” host posing as Joe’s workstation, named

“oilean.” Voilà! My computer was now an official host on Sun’s worldwide network!

Within a couple of minutes, with the help of rdist, I had managed to get root, since Sun, like Joe, had been lax about updating the security

patches. I set up a “shell” account and installed a simple backdoor giving me future root access.

Sayfa 331:

Now I targeted Novell, which, I discovered, used a server running the SunOS operating system as its

firewall gateway. I exploited a bug in a program called “sendmail,” which was used, among other things, to receive email from the outside world. My

goal was to get the source code for one of the leading network operating systems in the world, Novell’s NetWare.

I was able to create any file with any content I wanted by exploiting an unpatched security flaw in the sendmail program. I would connect over the

network to the sendmail program and type in a few commands like these:

mail from: bin

rcpt to: /bin/.rhosts

[text omitted]

.

mail from: bin

rcpt to: /bin/.rhosts

data

+ +

.

quit

These commands caused the sendmail program to create a “.rhosts” file (pronounced “dot-R-hosts”), which makes it possible to log in without

a password.

Sayfa 345:

I tried to connect to any one of the systems in the Cellular Subscriber Group, but I kept being blocked; apparently they were all firewalled. By

probing around Motorola’s network, I finally found one system with the “guest” account enabled—meaning that the gates had been left open, and I

could log in. (I got a surprise when I identified this system as a NeXT workstation, produced by the short-lived company Steve Jobs founded before

he returned to Apple.) I downloaded the password file and cracked the password of somebody who had access to that machine,

Sayfa 357:

Next I installed my modified Chaos Computer Club patch to the VMS Loginout program, which allowed me to log in to anyone’s account with a

special password,… I used a security bug to get full system privileges and then created my own fully privileged account—all in about five minutes. Within about an

hour, I was able to find a script that allowed me to extract the source code for any Nokia handset currently under development.

Sayfa 400:

The vulnerabilities were usually associated with the Unix-based operating systems–including SunOS, Solaris, Irix, Ultrix, and others—that made up most of the Internet back then.

Sayfa 459:

The idiot administrating the system exported everyone’s home directory (using Sun’s Network File System) to everyone on the Internet, meaning I could remotely mount any user’s home directory—that is,

make the entire directory accessible to my local system.

Bir Cevap Yazın

Aşağıya bilgilerinizi girin veya oturum açmak için bir simgeye tıklayın:

WordPress.com Logosu

WordPress.com hesabınızı kullanarak yorum yapıyorsunuz. Çıkış  Yap /  Değiştir )

Google fotoğrafı

Google hesabınızı kullanarak yorum yapıyorsunuz. Çıkış  Yap /  Değiştir )

Twitter resmi

Twitter hesabınızı kullanarak yorum yapıyorsunuz. Çıkış  Yap /  Değiştir )

Facebook fotoğrafı

Facebook hesabınızı kullanarak yorum yapıyorsunuz. Çıkış  Yap /  Değiştir )

Connecting to %s


%d blogcu bunu beğendi: