LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 06-17-2021, 09:00 PM   #1
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,310
Blog Entries: 28

Rep: Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136Reputation: 6136
The Omega Corporation Computer Hack


I just watched the Forensic Files episode about the Omega Corporation computer hack that happened in the mid-1990s. It was quite interesting. You can find it on Netflix.

You can read the New York Times article about the arrest. A web search for "omega computer hack" will turn up many other articles and reports.

Last edited by frankbell; 06-17-2021 at 09:27 PM.
 
Old 06-18-2021, 09:37 AM   #2
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,251

Rep: Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321
It was a different time in 1995.

Google was operating out of someone's garage, Linux was just getting together, windows-3.11 (installed iirc from 6×1.44MB floppies) was the rage. People knew the theory of hacking, but it nearly never happened. Servers were mainly unix boxes like the PDP-11. Big ones would be some Amdahl mainframe, or even an IBM if the company was stinking rich. The Amdahls were cheaper, but they lost the tech war and went into decline in the mid nineties. My kids got into some group of weirdos calling themselves Anonymous, before I copped on and stopped it. The Anonymous lot would hang out on some irc channel for hours, modify their .bat file, and everyone would download & run the same (Dos based) .bat file simultaneously, which just pinged the chosen IP, creating a DDoS. The ram would fill up, and the box would reboot, and they'd all laugh. Not like today's Anonymous at all.
 
Old 06-18-2021, 03:52 PM   #3
Trihexagonal
Member
 
Registered: Jul 2017
Posts: 362
Blog Entries: 1

Rep: Reputation: 334Reputation: 334Reputation: 334Reputation: 334
Quote:
Originally Posted by business_kid View Post
It was a different time in 1995.

Google was operating out of someone's garage, Linux was just getting together, windows-3.11 (installed iirc from 6×1.44MB floppies) was the rage. People knew the theory of hacking, but it nearly never happened.
Does Kevin Mitnick get wet under the "nearly never" umbrella statement?

Quote:
At age 12, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After he convinced a bus driver to tell him where he could buy his own ticket punch for "a school project", he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Social engineering later became his primary method of obtaining information, including usernames and passwords and modem phone numbers.

Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system that Digital Equipment Corporation (DEC) used for developing its RSTS/E operating system software. He broke into DEC's computer network and copied the company's software, a crime for which he was charged and convicted in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.
He has a pretty good book if you've never read it.
The Art of Deception: Controlling the Human Element of Security
Available in .pdf fpormat.

What about my favorite breakfast cereal as a kid, inspiration of and scanning receiver emulator of the mid 1990's? Phone phreaker Captain Crunch? My roof had so many antenna it looked like a porcupine.
 
Old 06-18-2021, 04:21 PM   #4
Bonzoo
Member
 
Registered: Sep 2018
Location: Costa Rica
Distribution: Antix21a2,Parrot rolling,MXfce19.4,Sparky Openbox
Posts: 233

Rep: Reputation: 48
Quote:
Originally Posted by business_kid View Post
It was a different time in 1995.

Google was operating out of someone's garage, Linux was just getting together, windows-3.11 (installed iirc from 6×1.44MB floppies) was the rage. People knew the theory of hacking, but it nearly never happened. Servers were mainly unix boxes like the PDP-11. Big ones would be some Amdahl mainframe, or even an IBM if the company was stinking rich. The Amdahls were cheaper, but they lost the tech war and went into decline in the mid nineties. My kids got into some group of weirdos calling themselves Anonymous, before I copped on and stopped it. The Anonymous lot would hang out on some irc channel for hours, modify their .bat file, and everyone would download & run the same (Dos based) .bat file simultaneously, which just pinged the chosen IP, creating a DDoS. The ram would fill up, and the box would reboot, and they'd all laugh. Not like today's Anonymous at all.
\It was the good ole days.When certain people refused bullshit and went into another direction. This "is what it is" bought Pintos, Gremlins and Vegas...and the real idiots bought Harleys,,,cus theyza amurkinn ! Every single piece of crap back then should have been returned under a lemon law clause
https://www.debian.org/doc/manuals/p...tory/manifesto

Last edited by Bonzoo; 06-18-2021 at 04:24 PM.
 
Old 06-19-2021, 06:18 AM   #5
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,251

Rep: Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321
It was the guys who had a clue about programming and/or hacking that were dangerous in the 1990s. And what were (by today's standards) massively sized computers (occupying full air-conditioned rooms) were very simple systems. Who would attack you over the internet? Getting on the internet was the big deal. Guys like Mitnick were mainly one offs.

The 1986 Amdahl mainframe had a 31 bit (=2G) address space, ran at 250Mhz, shipped with an (expandable) 64MB of memory, and used at least one 5V 400A power supply. But it managed on air cooling in it's own room with massive ducts. The IBM needed water cooling. They were very excited as I left Amdahl about the new model, which was in the labs and claimed 38 MIPS! It cost about IR£1 million(IR£1 ≅ GBP£0.95). Security in unix was basic - file ownership. Zero software security.

In the early 2000s, hacking was happening all right. I did HLFS or Hardened Linux from Scratch. Many programs were open to Buffer Overflow attacks, and the buffers were poorly placed beneath the stack, allowing overflow code execution. Overflow the buffer, issue a "goto 0000" in Assembler, and you were root. HLFS plugged the loopholes. Dos/Windows was wide open with fixed I/O addressing, A20 handling, boot viruses, etc.

The kernel, gcc, glibc, & server programs all sorted themselves out in short order, implementing Stack Protection, position independent code, 'canaries' to catch buffer overflows, and many features beyond my knowledge. And so the duel of the last 20 years began - Coders vs. Hackers.
 
Old 06-19-2021, 10:09 PM   #6
Trihexagonal
Member
 
Registered: Jul 2017
Posts: 362
Blog Entries: 1

Rep: Reputation: 334Reputation: 334Reputation: 334Reputation: 334
Quote:
Originally Posted by business_kid View Post
It was the guys who had a clue about programming and/or hacking that were dangerous in the 1990s.
That leaves me out.


Quote:
Originally Posted by business_kid View Post
In the early 2000s, hacking was happening all right. I did HLFS or Hardened Linux from Scratch. Many programs were open to Buffer Overflow attacks, and the buffers were poorly placed beneath the stack, allowing overflow code execution. Overflow the buffer, issue a "goto 0000" in Assembler, and you were root. HLFS plugged the loopholes. Dos/Windows was wide open with fixed I/O addressing, A20 handling, boot viruses, etc.

The kernel, gcc, glibc, & server programs all sorted themselves out in short order, implementing Stack Protection, position independent code, 'canaries' to catch buffer overflows, and many features beyond my knowledge. And so the duel of the last 20 years began - Coders vs. Hackers.
That's pretty impressive. Where did you learn to use computers?
 
Old 06-20-2021, 03:15 AM   #7
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,251

Rep: Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321Reputation: 2321
I had a business from 1989 fixing Industrial Electronic hardware which I started with nothing and started with computers asap. In those days, chip data was in databooks which would be given annually by sales rteps to local research outfits, or the like. There was no way for a small timer to get them (You required one per manufacturer). So I taught myself and scratched around online.
 
Old 06-22-2021, 11:03 AM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,636
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
I'll just make the idle comment that I have never yet encountered a "hack" that was not in fact an inside job.

Consider this: "Someone walks down the street, picks a building at random, walks inside, and twenty minutes later walks out with the Crown Jewels of England – all unassisted." What are the odds of that happening? Zero. He wouldn't know which building contained the jewels, wouldn't know where to go, couldn't avoid being detected, and couldn't unlock the door. The only credible possibility is that a "highly trusted" insider did it, and then tried to blame it on a faceless "hacker" in order to cover his tracks. When investigating, start at the top and work downwards.

When the first cash registers were introduced, "trusted" clerks immediately resigned, and theft losses declined precipitously.

Last edited by sundialsvcs; 06-22-2021 at 11:07 AM.
 
Old 06-22-2021, 06:24 PM   #9
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,596

Rep: Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545Reputation: 2545
Quote:
Originally Posted by sundialsvcs View Post
I'll just make the idle comment that I have never yet encountered a "hack" that was not in fact an inside job.
I have.

Quote:
Someone walks down the street, picks a building at random, walks inside, and twenty minutes later walks out with the Crown Jewels of England – all unassisted." What are the odds of that happening? Zero. He wouldn't know which building contained the jewels, wouldn't know where to go, couldn't avoid being detected, and couldn't unlock the door.
Everyone knows precisely which building the Crown Jewels is in. They are a public exhibit. Most likely the only challenge would be being undetected - because people are looking right at them!

An easier way would be to wait until a suitable occasion, then use a drone to snatch the crown from Elizabeth Windsor's head.

(Hey GCHQ guys: I don't care about shiny stuff. If this actually happens one day, it was someone else, not me.)
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Raspberry Pi OS Update to hack WiFi Hack LXer Syndicated Linux News 0 08-20-2017 02:12 PM
Hack, hack, hacking away!! cousinlucky General 6 07-09-2015 01:01 PM
LXer: Openoffice.org Issues an Invitation to Dell Computer Corporation LXer Syndicated Linux News 0 03-12-2007 08:46 AM
Compaq Computer Corporation Netelligent 4/16 Token Ring and debian? Boudewijn Linux - Hardware 1 01-29-2005 10:36 AM
Hack Hack anoop_chandran Linux - General 9 12-07-2001 10:38 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 02:12 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration