Convicted VoIP Hacker Robert Moore Speaks 183
An anonymous reader writes "Convicted hacker Robert Moore, who will report to federal prison this week, gives his version of 'How I Did It' to InformationWeek. Breaking into 15 telecom companies and hundreds of corporations was so easy because most routers are configured with default passwords. "It's so easy a caveman can do it," Moore said. He scanned more than 6 million computers just between June and October of 2005, running 6 million scans on AT&T's network alone. 'You would not believe the number of routers that had "admin" or "Cisco0" as passwords on them,' Moore said. 'We could get full access to a Cisco box with enabled access so you can do whatever you want to the box. We also targeted Mera, a Web-based switch. It turns any computer basically into a switch so you could do the calls through it. We found the default password for it. We would take that and I'd write a scanner for Mera boxes and we'd run the password against it to try to log in, and basically we could get in almost every time. Then we'd have all sorts of information, basically the whole database, right at our fingertips.'"
Geico commercial filming (Score:4, Funny)
So, not only do cavemen work in video production, they do network admin?
Re: (Score:2)
Re: (Score:3, Funny)
Re:Geico commercial filming (Score:5, Funny)
No, read more closely. He wasn't talking about cavemen in general. He was talking about one particular caveman. [wikipedia.org]
Re: (Score:1)
I don't think cavemen ever had to deal with the fear of dropping the soap in a federal prison....and for god's sake, don't use the powdered kind.
Re: (Score:2)
Cavemen are technology leaders (Score:2)
Wonder if they had/have blue teeth?
Obligatory... (Score:5, Funny)
Re:Obligatory... (Score:4, Funny)
Well (Score:5, Insightful)
Re:Well (Score:4, Informative)
Re:Here's one I do (Score:5, Interesting)
I think I had 5 routers in my neighborhood on channel 6, with default passwords.
I logged on into each and switched them to different channels.
Re: (Score:3, Insightful)
I should hope if they are knowledgeable enough to want their router configured that way they would also know to change the password from the default.
Re:Well (Score:5, Insightful)
Easy solution - disable the product until the password is changed and intercept http connections so you can give people a helpful page saying "The default password is 'password'. This must be changed before this router/switch can be used. Click [here] to do so."
I fail to see any flaws with this solution. Also read 'The Design of Everyday Things'.
Re: (Score:2)
I suppose that you probably don't. So let me help you out. The first problem you are going to encounter is that something like 15-20% of the customers are goijng to take an utterly irrational "It's MY router. How about you clowns let ME determine how to configure it?" attitude The second is that quite possibly a small percentage of them will actually need to run with default passwords. You can't imagine why.
Re:Well (Score:4, Insightful)
Considering that you get folks like SAC who set the PAL codes for all their nukes to 00000, yeah there will always be people that bypass it. But at least won't be because nobody touched it at all -- someone had to run the setup. And when users get cranky and bypass it, then it's now 100% their problem. Especially when the SOX auditors come knocking.
Re: (Score:2)
Plus which I get a sense that the military didn't really trust the things anyway.
The problem with consumer-level equipment is that vendors are terrified that good ol' Joe User
Re: (Score:2)
Not just SOX (Score:2)
Re: (Score:2)
Got a reference on that? The only relevant things I can find on Google are your post and an article in German that credits the story to USA Today which is not my idea of a really reliable news source. Searching the USA Today archives for "pal code" and "pal codes" gets no relevant hits.
I am pretty skeptical that actually happened with a live, deployed nuclear weapon. The reason is that before a nuclear sys
Re: (Score:2)
Granted, it's hard to get multiple sourcing on this, but Bruce Blair and the CDI are hardly a bunch of sensationalist muck-rackers. I suspect the audits to which you refer were partly a response to SAC's little maneuver.
Re: (Score:2)
Presumably these devices don't route packets, handle VoIP calls, etc. until you've at least put in basic network settings anyway. Seems like all you really need to do is make the device ask you to set an initial password as the very first step in the setup process.... It isn't rocket science. It's like when you get a UNIX account on some university box. They set an initial password based on your student ID/name/whatever. and the very first thing is a prompt that requires you to set a real password....
Re: (Score:2)
Re: (Score:3, Insightful)
Users must be protected from themselves for the good of the whole. We don't allow people to drive 100MPH on the highway. We don't allow people to shout 'fire' in a crowded theater. What are people going to do, not use their computers? We're way past that point. The PC has become as important
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Are you sure it's the user?
So, let me ask you this - why is the default password on routers all the same? Why isn't it different for each unit, and imprinted on the box or something? Such a trivial thing to do, yet it would do so, so much for improving security, and would have a trivial effect on usability.
Routers are security devices. Other security devices (such as bike locks) have the default being rather secure, why can't route
Re: (Score:2)
I've seen bike locks where the default is the same for all new, same model locks and I'm not sure I've ever seen a briefcase where the default wasn't 000 000. I think many people never change their briefcase combination but everyone changes their bike lock combination if it is a default of 0000 or 1234. I'd say the difference is that a briefcase is rarely left unattended or l
Re: (Score:2)
Re: (Score:2)
If the default password is imprinted on the outside of the equipment (say, on the bottom) and is a relatively good password, how is that not better than "admin" or "Cisco0" as the password?
Re: (Score:2)
The guy was me, if you were paying attention. I know what I said. I meant "box" as a synonym for case.
Also, "imprinting" on the outside of the equipment is not exactly trivial and certainly not free, especially if something goes wrong.
Should be rather easy with a smidgeon of WORM Flash memory to set this at the time of imprinting. In other words, the machine that stamps the password is simultaneously burning the password into WORM memory electronically
Re: (Score:2, Insightful)
"Those who cannot learn from history are doomed to repeat it."
Here's my analogy. What if every lock manufacture sold you house locks with the same
he should study more (or moore) (Score:5, Funny)
Apparently Moore's law isn't quite up to snuff.
Re: (Score:1)
Random passwords (Score:4, Interesting)
- They must run a test suite before shipping them so it should be easy to make that tool generate a random password and assign it to the router
- You would have to print it on the router, or on a slip of paper
- If it is printed on the router itself then you could make the router's reset button go back to that password, instead of Cisco0.
Even if you don't implement that last bullet, it still seems like it would help a lot.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
No, they mustn't. Frequently, if your production QA is good you don't do 100% testing before shipping. Random sampling is usually good enough and significantly cheaper. I can't speak to any specific router manufacturer, but this is SOP in manufacturing.
Re: (Score:3, Interesting)
Every device with an Ethernet interface has a 48-bit unique identifier built in. All such devices, in my experience, also have a sticker that displays their Ethernet address. Would it be so difficult to include, at manufacturing time, a small ROM that contained an initial password, unique to each device, and also displayed on a sticker? The additional cost of such a feature needs to be weighed against the additional security provided, but I think in some markets it would be a definite win.
The manufactu
Re: (Score:2)
Either way, this is going about it the long way. The simple solution is to make it so you have to change the default password the first time you config the device. Feel free to leave it "admin" from the factory, as long as it can't be "admin" after it gets configured.
Re: (Score:2)
Then just need to use the same formula to generate the stickers, which might be a bit harder.
I'd rather just see them take the approach common wireless routers use-- Hold a button down to auth your device to it. Make this the only way to login initially or reset the pass.
Re: (Score:2)
The problem with using the MAC address to generate the default password is that it is easy to determine the MAC address from the outside, and therefore the default password.
Re: (Score:2, Interesting)
Re:Random passwords (Score:5, Funny)
That's actually not so bad. In order to get on the wireless network to use the admin password in the first place, they would need to guess your SSID and WEP key. And everyone knows that's impossible, right?
-:sigma.SB
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
It is an option, but it is turned off by default. I actually turned it on for my WRT54G (running Thibor) so that I could access the admin pages from my laptop. However, since I am also using AES [wikipedia.org], HTTPS, MAC whitelist filtering, and strong (not default) admin password the extra risk is very minimal.
Re: (Score:2)
That leaves you with your WPA-PSK (presumably) and AES encryption as your security measures. Not that these are insignificant hurdles though.
Re: (Score:2)
In fact it is quite possible, I do it on my laptop. One of the first things that I did when I configured my XP laptop was override the default MAC address on the wireless card to a different address (random) of my choosing to futher enhance my security and privacy when I connect to public WiFi networks (in the unlikely event that somebody, for whatever reason, would attempt to trace back that MAC address to the laptop and wireless card manufacturer who issued
Re: (Score:2)
Crappy WLAN equipment! (Score:2)
But maybe it's a peculiarity of the German DSL market that AVM (www.avm.de/en) is now the market leader. And they DO provide their Fritz!Box series with preconfigured, random WPA2 keys and an 802.11g USB dongle that syncs the key when it's sticked into the Fritz!Box USB port.
Heck, I tried to find some "free" access in my mother's apartment. ALL her neighbours had some flavour of the Fritz!Box running, ALL were
Re: (Score:2)
Re: (Score:1)
Well they do it for $2 padlocks...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Defaults (Score:2)
Re: (Score:2)
At least that "Hacker" actually used some skill. (Score:1, Funny)
A few years ago a major New Zealand ISP was "hacked" -- or so the media said. The biggest talkshow host of the time interviewed the alleged "h4x0r" live, and proclaimed him to be a "computer genius". We were all in deadly and imminent danger of being hacked by guys like him he said.
The "hacker" in question was a 13 year old whose friend's older brother worked for the ISP. The older brother had stupidly given his staff
Re:At least that "Hacker" actually used some skill (Score:3, Funny)
Ridiculous! (Score:3, Funny)
That's ridiculous. Everyone knows the most commonly used passwords are "love," "secret," and "sex." Oh and don't forget "God." It's that whole male ego thing.
Re: (Score:2, Funny)
Re: (Score:1)
(see username)
And yes, it is sad that I have watched that movie enough times to know the 'hackers' handles
Re: (Score:2)
Mess with the best, die like the rest!
"Pool on the roof. Sprung a leak."
"And yes, Mom, I'm still a virgin!"
"Crash 'N Burn"
eof.
yet again they shoot the messenger... (Score:1, Insightful)
imagine what havoc he could have made if he had been malicious, or had sold the passwords to Osama....
Not if he exploited it and kept it hushed up. (Score:5, Insightful)
If he told the owner about the insecurity and didn't exploit it himself, yes.
imagine what havoc he could have made if he had been malicious, or had sold the passwords to Osama....
Or if he kept it quiet and exploited it himself - stealing services and running up bills for the victimized system owners, building a business on it and pocketing money for himself and his co-conspirators.
Wait... That's what he did, isn't it?
No, he should not be congratulated. He should be convicted and punished as the thief he is.
Wait... That's what happened, isn't it?
Isn't it nice
Just because the front door isn't locked... (Score:2)
On the other hand, why hasn't anyone thought of launching suit against the VOIP providers over the security breach? Tort law in the good ol' US of A is the most stringent in the world when it comes to "duty of care". Leaving passwords at factory defaults certainly could constitu
Legally they ARE the same. (Score:2)
What sort of messed up logic is THAT? OK lets play with this a bit:
It should NOT be illegal to log into an unprotected router and mess around with it without the owner's permission because the router owner is stupid for not securing his network. This is different--FROM A MORAL STANDPOINT--than entering a private dwelling that is unlocked to explore and mess around inside (an ille
Solution: Eliminate Product-wide Default Passwords (Score:1)
Instead of having a default password, why not have pre-generated passwords that are decently strong that are already on the router when you get the device, and have a sticker on the router with that password. Th
Re:Solution: Eliminate Product-wide Default Passwo (Score:1)
And the managers will say, "Yeah. We have the MAC address on there already. We can use that for the default password."
Re:Solution: Eliminate Product-wide Default Passwo (Score:2)
Re: (Score:2)
That's pretty hard considering the host name isn't assigned until the OS is installed.
Re: (Score:2)
Re:Solution: Eliminate Product-wide Default Passwo (Score:2)
That way the bad guy would need physical access to the particular box to read that label to get what he needs to construct the default password. (Since it's a default password the "view the label" hole could be instantly plugged just by changing it.)
(Not from the MAC address, of course, nor the serial number if that's available i
Wait-that's what you said. Duh... (Score:2)
Guess it comes from trying to read slashdot in a cave...
Damn... (Score:4, Funny)
Yay for VPNs (Score:2)
-b.
Re: (Score:2)
Better he than they (Score:1)
Re: (Score:1)
So easy a caveman could do it (Score:4, Insightful)
So easy a caveman could do it.
But apparently not so easy a caveman could avoid getting caught?
What ever happened to the supercool hacking-thang called "not getting caught"?
- Jesper
Re: (Score:1, Interesting)
Oh like that'll get you a book deal and job in the computer security field.
If you don't get caught you'll never even merit an article on
Re: (Score:2)
1.) Hack stuff using script-kiddie techniques
2.) Keep at it until you are caught
3.) Tell everyone the story about you being an idiot who got caught
4.) Do a month of jailtime
5.) $$$!
Is that the kind of people who programmed my personal firewall and my anti virus app.?
(Pleeeease, say "no", pleeeease, pretty-please)
- Jesper
Re:So easy a caveman could do it (Score:5, Funny)
It could even be happening right now...
Re: (Score:2)
Am I missing something? (Score:1)
this sounds kinda like "hacking" into your neighbors open wireless network.
He's no hacker, just a nuisance and a thief. This guy deserves jail time.
Re: (Score:3, Funny)
And which heads will roll? (Score:3, Informative)
The REAL problem I see with IT is a combination of inept administrators and an abundance of managers who don't understand the significance of things like this. A mistake like this not only represents a failure of an IT worker, but poor oversight by their manager. I've seen an administrator hired who had no technical competence but was able to talk to the managers about cricket. He was then replaced with a person who was even worse when the first dumb admin did the IT thing and left after making a huge mess. And yeah, a year after I'd left, the second administrator, after purchasing a new Cisco router with zero scoping calls me up and asks, "How do I install a Cisco router".
There are books out there like "The practice of system and network administration", they help new administrators immeasurably, but so many just don't give a damn. There needs to be more incentive to have serious consequences for sloppy work. If we're ever going to be taken seriously, we need to find and flog administrators who set up a production router/firewall with a default password.
Re:And which heads will roll? (Score:4, Insightful)
Now imagine that you want to change the passwords. You can't bring the network down or impact any current work. Networks of this size are constantly being modified. New devices added, routes being updated/refreshed. Redundancy deployed or a failure causing it to be exercised.
AND you are a business - the people making decisions don't know anything about security - the only question is "what will all this work do to make more money?" Nothing? Then don't do it.
Tracking 80,000 passwords isn't easy. During emergencies - your phone won't ring - your mother with a pace maker needs 911, not having access to the password in a switch that needs to be reconfigured manually isn't a good excuse.
Ok, 1 of those hundreds of people leave the company. Do you change all the passwords
I've never seen a switch or router guy that wasn't overworked. Just like security folks.
Anyway, just a few thoughts. It is never as simple as it seems.
BTW, I worked at the big telecom company that wasn't hacked. I've since moved to a different telecom that is constantly being hacked and in the news for it. Until a few months ago, they had laughable security standards that seemed left over from 1990 to me and a flat network. Simply stupid, but being secure is a huge undertaking that isn't just network security, as you know. Only security failures get Executive attention, sadly.
The problem lies with vendors? No! (Score:2)
I don't think so Alan. The means is there for an able bodied person to setup appropriate credentials within a few minutes. Most of these stupid logins are web based anyway. You click "Admin" and then "Change Password" and things are a lot better than they were a couple minutes ago. The biggest problem is unskilled technical people in po
liability? (Score:2, Insightful)
Wow, what a fall from grace... (Score:2, Funny)
hacking?? (Score:2, Funny)
Are we supposed to be impressed by his elite port scanning abilities?
And what is the 1st thing you do (Score:4, Informative)
Nice to know telecom companies don't have a clue.
why? (Score:2, Interesting)
How to create a strong password (Score:2, Informative)
"Make it a combination of capital letters, small letters, numbers and special character but PLEASE remember it! Or I'll fine you $5!! "
Here you can find some tips on how to create a strong password. http://www.watchingthenet.com/how-to-create-strong-passwordsand-remember-them.html [watchingthenet.com]
about the weak link [the users] (Score:2, Interesting)
i used to work as a cybercafe admin in a hotel [ClubMed(R)] and someday, when i was messing with the routers telnet interface, i decided to do a quick check on the pdf manual i had about it and look for the defau
Will anyone ever learn? (Score:2)
On the other hand, e-commerce system are extremely vulnerable if security is this lackluster. I am not su
Security at it's finest... (Score:2)
I would prefer to blame the device manufacturers that allows the use of easy passwords in the wild. It is so outdated by now and any sensitive devices should have a protection that is better than only using a password to protect them. Using a certificate solution (smartcard or similar [aladdin.com]) together with SSH will make things a lot harder for any intruders.
Re: (Score:2)