"Gresh, Lois - Termination Node" - читать интересную книгу автора (Gresh Lois)

powerman>finger -g
A short list of all system users scrolled down the screen. It showed no intruders.
powerman>netstat -a
A quick status check of all system sockets, every low-level software device feeding into the system. Nothing. "Do it again," Jose said.
powerman>netstat -a
This time, the screen showed an established Internet connection coming from a foreign address called Helraze.
"I'd better call Naresh." Jose sounded scared. Naresh was his boss. Jose never called Naresh, who was a grade fifteen in the bank hierarchy. A grade fifteen who lived in a swanky house and reigned from a swanky cubicle on management row.
She'd spare Jose the agony, She'd handle Helraze herself. "Naresh lives fifteen minutes away. He can't get here in time."
"Yeah, guess you're right. Jesus, how the hell will I explain this to him? The bank's laying off people again. Next week."
The netstat command displayed its results again. This time, no connection from Helraze.
"Maybe you won't have to explain anything," Judy said. "The hacker's popping in and out of the system, removing cash, but replacing it. Could be he won't do any real damage."
"But why's he doing it?"
Damned if she knew.
One thing to do, Track the sucker. Discover the route he'd taken through the millions of Internet computer nodes to get to Laguna Savings.
He was far away, this Helraze, routing transmission packets through forty-seven other computers. Who the hell was this guy, and what did he want?
"Try tracing it again," Jose said.
This time, Helraze disappeared, simply disappeared as if he had never existed.
"The main password file," Jose said, "that's gotta be it." He pushed past Judy, touched an icon in the lower corner of the screen.
She scanned the encrypted MD6 file digest, which contained the main passwords, for security breaches. "Clean, all access codes in place and valid," she said.
"The syslogs are all clean, too, no breaches/' Jose confirmed. "Hey. what's this? Fake syslog messages, Judy, as if dozens of superusers logged in tonight."
"Let me see." She gently nudged him aside, giving herself room again.
Superuser access was critical. It meant the hacker could get into all protected system files. He could bring the bank to its knees, destroy everything, transfer any amount of money, anything he wanted. So why wasn't he doing it, and quickly?
Both lastlog and umtp showed no indication of the hacker. She checked the syslogs again. They were wiped clean; all fake syslog messages had been removed.
Hopefully, their mystery hacker had screwed up. Rather than delete log entries that could be used to trace his system penetration, maybe he'd been in a hurry and had just replaced the entries with null char-
acters. Blank lines, filled with nulls, would prove penetrationЧand right now, with all logs wiped clean and all accounts restored, there was no proof of a break-in. Judy's neck ached from the tension. Bank officials always demanded proof.
"Nothing," Jose said. "This guy knows exactly what he's doing. No authorization failures in /var/adm/messages. Nothing strange in the supeuser log. No shell history. There's nothing to trace. It's as if the guy's never been here."
"If we don't get to the bottom of this, and soon," Judy said, "we'll have to notify top management. They may have to close the bank this morning."
"No proof. My God, Naresh will kill me."
Jose was right. Naresh would kill him. And management would never close the bank based on the statements by two programmers who thought they had discovered a weird system anomaly. Management never understood anything about computer systems anyway, even when there was proof.
"We're running out of time," Jose said.
Judy glanced at her watch; it was already four o'clock in the morning. In a few hours, bank customers all over the city would be turning on their computers and processing transactions over the Net. By the time management showed up, Net business would be at its peak.
"This hacker must have been sniffing the bank's Web page for weeks," Judy said, "just waiting for an opportunity to crack into the server. He got that opportunity when you sent the new password file to marketing."
Tap into a cable, intercept transmissions, pick up the new password file as it went from the central computer site to the downtown office. Simple enough. She said, "He hacked into the password file, added himself with privileged access to everything we have. Then he screwed with the Hirama accounts, deleted his fake password, erased all trace files. He's fast."
"And he may not be done," Jose said.
Judy trembled, hit by a sudden rush of fear. What if this guy had
entered through the Web itself? Jose had coded some of the Web site using ControlFreak. What if the guy had hacked into the low-level software I/O routines, the system sockets? If so, he could be accessing bank files right now, writing to them, wiping them clean of money.
Judy stared at the monster machine: six parallel processors, all cranking with more than 400 megabytes of memory and tons of terabyte disk muscle, The latest crypto chips. All known Internet browser hacks plugged. From the Net, there was no way into Laguna accounts.
"He's doing something new, Jose. ControlFreak's clean at this bank. Remember, I'm the one who plugged all the holes. This hacker's cracked into the system using some method we've never seen before."
"We could rip out the wires leading to the punchdown blocks, cut his connection."
"That would fry the system. And if we just shut everything down, we'll never know who this guy is, or what harm he's done. Besides, if he wants to, he'll come back."
"I'm launching the agents," Jose said, touching the computer screen. The agents appeared, jiggling animations of bugs, real cute, butЧ
"Worthless," Judy said.
"Nothing else to do, not that I can think of." Jose touched the EXECUTE icon. The agents jiggled and the directory structure scrolled down the screen. The agents, artificially intelligent digital creatures mainly used for Net searches, were scouring Jose's Net files, seeking clues about the intruder.
System clean
Nothing.
"Waste of time," Judy said. Lack of sleep combined with tension had her head pounding. She stretched her back, raised her arms, tried to unknot her muscles.
The agents jiggled again. Then in metallic blue letters:
System compromised
Judy froze, arms still above her head. "What theЧ" But, as her arms came down, the status changed:
System clean