SHARE
Facebook X Pinterest WhatsApp

RootPrompt.org: Cracked! Part 2: Watching and Waiting

Written By
thumbnail
Web Webster
Web Webster
May 10, 2000

[ Thanks to Noel
for this link. ]

“This is the second part of the story of a community network
that was cracked and what was done to recover from it.
The
first part Cracked! Part1: Denial and truth details the report that
leads to the discovery that the community network was indeed
cracked and some of the initial reactions. This article talks
about how they learned more about the cracker and what they did
next.”

“We were still very concerned that if the cracker realized that
we were on to him he would just trash the system to cover up his
tracks. We did not feel that we had any way to be sure that we
could get all of the backdoors that he could have installed due to
length of time that he had been on the system. But at the same time
we needed to learn more about what he was doing and were he was
coming from. We also hoped that we could gather clues about how he
had gotten in. So we decided to run a sniffer to watch what he was
doing.”

“…I set up a sniffer to watch for traffic going to the ISP and
some of the sites we had suspected he was coming from. We thought
that by watching him to see were he was coming from and what he was
doing that we could get some idea of who he was, what his
motivations were and most important what he was doing. We also
thought that we could use this to find out what kind of skills he
had. Was he a script kiddie, or a super cracker like it was
claimed?”

Complete
Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.