Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Have Crackers Found Military's Achilles Heel?
- To: NTBUGTRAQLISTSERV.NTBUGTRAQ.COM
- Subject: Have Crackers Found Military's Achilles Heel?
- From: Russ <Russ.CooperRC.ON.CA>
- Date: Wed, 22 Apr 1998 00:00:56 -0400
- Reply-To: Russ <Russ.CooperRC.ON.CA>
- Sender: Windows NT BugTraq Mailing List <NTBUGTRAQLISTSERV.NTBUGTRAQ.COM>
This will likely get some air play. http://www.wired.com/news/news/technology/story/11811.html The article refers to a group who claim to have stolen DISA's DEM, or Defense Information Systems Equipment Manager. Notable to NTBugtraq is this group's claim that they retrieved it via an NT Server. I'd certainly be interested in hearing whether or not this NT box was directly exposed to the Internet or whether it was protected by a Firewall. The article quotes the group, "Masters of Downloading" or MOD for short, as suggesting to the DoD that they make sure no classified systems are connected to the Internet, period. I would've thought that should have been obvious, but like Y2K, describing the problem is a heck of a lot simpler than fixing it. Its likely the exploit was made possible through a series of configuration errors (or lack of configuration), but if there's an exploit afoot, let's hear about it. Cheers, Russ