Forwarded from: Tim Slighter <timslighterat_private> I read that story and I would like to have the glorious opportunity of confronting the "so-called" hackers to find specifics on how exactly they managed to bypass perimeter defense. First off, what Financial Institution would be stupid enough to place DNS on the same server as the Firewall ? (especially if there was 50 Million of that guy's cash there), Secondly, even if they had done something so stupid as placing DNS on the Firewall, the only bypass vulnerability that Checkpoint Firewall-1 has been known to have is the PASV FTP where a one way connection could be exploited given very specific conditions. Assuming that they had gained access, then the initial claim that they had "hacked" the DNS server would indicate that access was gained via port 53 or a known exploit via DNS, this however, would not provide them with any known exploits by which to bypass the Firewall. The more I research this and the more I think about it, that story has more holes in it than Swiss Cheese. What a HOAX !! -----Original Message----- From: InfoSec News [mailto:isnat_private] Sent: Friday, September 28, 2001 5:21 AM To: isnat_private Subject: [ISN] Sudan Bank Hacked, Bin Laden Info Found - Hacker http://www.newsbytes.com/news/01/170588.html By Ned Stafford, Newsbytes MUNICH, GERMANY, 27 Sep 2001, 2:46 PM CST A group of U.K.-based hackers has cracked computers at the AlShamal Islamic Bank in Sudan and collected data on the accounts of the Al Qaeda terrorist organization and its leader Osama bin Laden, Kim Schmitz, a flamboyant German hacker/businessman, has claimed. Schmitz, who has offered a $10 million reward for the capture of bin Laden, told Newsbytes that the information has been turned over to the FBI. Bin Laden, a millionaire Saudi exile whose base is now Afghanistan, is suspected of being the driving force behind the deadly Sept. 11 attacks on the World Trade Center and the Pentagon with hijacked planes. Newsbytes could not confirm Schmitz's claim. An FBI spokesman in Washington declined to confirm or deny the story, saying that the agency's policy is not to comment on information and leads it is receiving. [...] - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Sun Sep 30 2001 - 05:19:12 PDT