WebApp Sec mailing list archives

Re: Hacking/security in main-stream media


From: Tello Totti <totti540 () gmail com>
Date: Thu, 21 Oct 2004 10:22:12 -0400

I think Mitnick sent a bunch of SYN packets to Shimomura's server and
filled up the request queue, which prevented it from responding to
anything else until Mitnick had conducted his nefariousness.  Classic
SYN flood...

I don't know if this was distributed among many hosts or simply
Mitnick's though.


Re: Kevin Mitnick was caught by this guy called Tsutomu Shimomura.
There is a book called "Takedown" by John Markoff which describes the
whole episode. Nice read.



On Thu, 21 Oct 2004 00:46:29 -0700, Jeremiah Cornelius <jeremiah () nur net> wrote:
If I'm not mistaken, I went to school with Markus Hess as an exchange student about 79-81.  We learned UCSD Pascal in 
the same classes, on a DEC PDP-11/70.

Small world...

-----Original Message-----
From: Kevin Poulsen [mailto:klp () securityfocus com]
Sent: Tuesday, October 19, 2004 6:42 PM
To: 'Chacon, Oscar'; 'Levenglick, Jeff'; 'Edward Miller';
jasonmerriman11 () aol com
Cc: 'Mike Andrews'; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media



Its called The Cuckoo's Egg.  My buddy was one of the guys who
investigated and caught Kevin Mitnick, or was it Kevin
Poulsen?  The
guy who disappeared was most likely killed by German/Russian
intelligence.

That was me. (I got better.)




-----Original Message-----
From: Chacon, Oscar [mailto:Oscar.Chacon () cnb com]
Sent: Tuesday, October 19, 2004 9:18 AM
To: 'Levenglick, Jeff'; Edward Miller; jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media


Its called The Cuckoo's Egg.  My buddy was one of the guys who
investigated and caught Kevin Mitnick, or was it Kevin
Poulsen?  The
guy who disappeared was most likely killed by German/Russian
intelligence.

Oscar Chacon, CISA
Vice President & Manager
Information Security
Information Services Division
City National Bank
555 South Flower Street
Los Angeles, California 90071
Telephone:  213 - 673 - 8051
Facsimile:  213 - 637 - 3915
oscar.chacon () cnb com


-----Original Message-----
From: Levenglick, Jeff [mailto:JLevenglick () fhlbatl com]
Sent: Monday, October 04, 2004 6:08 AM
To: Edward Miller; jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media

This one might be the oldest that I know of.

I can't really remember the movie name. (its on the tip of my
tongue...) (something egg?)

It is based on the real story of a student who discovers that the
school was being used as a 'pass thru' to US military computers. I
think it was back in the 70's. I remember bits:

1 - He hooked up line printers to each phone line to trace
the person
and print what he was doing. 2 - He had each operator on a call and
listened as each one traced and then call the next operator.
3- They traced it to Germany. (If I remember correctly?)
4 - I think it was 3 hackers. 2 of them disappeared and the
last one,
in a panic, spilled the beans. (He insisted that the govt
was covering
everything up and killed his friends)


Jeffrey

-----Original Message-----
From: Edward Miller [mailto:EMiller () tax state va us]
Sent: Thursday, September 30, 2004 05:12 PM
To: jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: Re: Hacking/security in main-stream media






how about Minority Report - biometric access control by retina scan





             "Jason Merriman"

             <jasonmerriman11@

             aol.com>
          To
                                       "Mike Andrews"
<mike () se fit edu>
             09/30/2004 09:46
          cc
             AM
webappsec () securityfocus com

     Subject
                                       Re: Hacking/security
in main-stream
             Please respond to         media

             jasonmerriman11@a

                  ol.com













 > War Games - [Not sure yet, not managed to pickup the film]

Computer creator uses his son's name as the main password for
the system.


 > Hackers - [Not sure yet, not managed to pickup the film]
Characters dumpster dive to get materials which assist in
accessing systems.


Mike Andrews wrote on 9/29/2004, 4:00 PM:

 > A bit off the wall, but as good a place to post this as
any :)  >  > I'm writing a tutorial/courseware on security
(both basic topics and  > programming) and I'm looking for
clips from movies or tv to introduce  > subjects - I've found
that videos work well with introductions and short  > breaks
to getting the audience in the right frame of mind (as well
as  > getting them relaxed).  So far I have the following....
 >  > Jurassic Park - insider threat (the programmer gets the
system to bypass  > security while he steals the DNA/embryos)
 >  > Sneakers - Cryptography (when the team discovers it's a
crypto box they  > have)  >  > The Net - Personally
identifiable information (main characters personal  >
information is deleted)  >  > War Games - [Not sure yet, not
managed to pickup the film]  >  > Hackers - [Not sure yet,
not managed to pickup the film]  >  > Any other suggestions?
I'm only wanting short (5min) sections, but I'm  > willing to
edit bit's out if needed.  >  > Cheers,  > Mike.  >  >  >
----  > Mike Andrews  > Florida Institute of Technology  >  >  >

--
----------------------------------------------------
Jason Merriman
Systems Administrator, America Online
aim: jasonmerriman11
----------------------------------------------------




-----------------------------------------
This e-mail message is private and may contain confidential
or privileged information.







Current thread: