[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Anonymous return addresses
> Can anyone "give away the Ending" of Cliff Stoll's book - and describe
> the basic methodology used to track back to the German hacker?
Can't remember the exact details (and I can't remember where
my copy is :), but basically they used the ACK/NAK times in the kermit
protocol to guess his distance. After tracing him back to some firm
in Va, they worked out to Germany and then the Bundespost ran a phone
trace to find him. (So all y'all malicious crackers that have the
TLAs trembling in their jackboots remember to tweak your kermit (or
rz) progs to randomize response times. :)
I'd reccommend reading the book. It's pretty interesting. Or
Nova did an episode ~2 years back (whenever the book came out) that
was a quick 1hr version of the whole story.
---
Fletch __`'/|
[email protected] "Lisa, in this house we obey the \ o.O' ______
404 713-0414(w) Laws of Thermodynamics!" H. Simpson =(___)= -| Ack. |
404 315-7264(h) PGP Print: 8D8736A8FC59B2E6 8E675B341E378E43 U ------