"Lois Gresh - Termination Node" - читать интересную книгу автора (Gresh Lois)

Both lastlog and umtp showed no indication of the hacker. She checked the syslogs again. They were
wiped clean; all fake syslog messages had been removed.

Hopefully, their mystery hacker had screwed up. Rather than delete log entries that could be used to
trace his system penetration, maybe he'd been in a hurry and had just replaced the entries with null char-

acters. Blank lines, filled with nulls, would prove penetration—and right now, with all logs wiped clean
and all accounts restored, there was no proof of a break-in. Judy's neck ached from the tension. Bank
officials always demanded proof.

"Nothing," Jose said. "This guy knows exactly what he's doing. No authorization failures in
/var/adm/messages. Nothing strange in the supeuser log. No shell history. There's nothing to trace. It's as
if the guy's never been here."

"If we don't get to the bottom of this, and soon," Judy said, "we'll have to notify top management. They
may have to close the bank this morning."

"No proof. My God, Naresh will kill me."
Jose was right. Naresh would kill him. And management would never close the bank based on the
statements by two programmers who thought they had discovered a weird system anomaly.
Management never understood anything about computer systems anyway, even when there was proof.

"We're running out of time," Jose said.

Judy glanced at her watch; it was already four o'clock in the morning. In a few hours, bank customers all
over the city would be turning on their computers and processing transactions over the Net. By the time
management showed up, Net business would be at its peak.

"This hacker must have been sniffing the bank's Web page for weeks," Judy said, "just waiting for an
opportunity to crack into the server. He got that opportunity when you sent the new password file to
marketing."

Tap into a cable, intercept transmissions, pick up the new password file as it went from the central
computer site to the downtown office. Simple enough. She said, "He hacked into the password file,
added himself with privileged access to everything we have. Then he screwed with the Hirama accounts,
deleted his fake password, erased all trace files. He's fast."

"And he may not be done," Jose said.

Judy trembled, hit by a sudden rush of fear. What if this guy had entered through the Web itself? Jose
had coded some of the Web site using ControlFreak. What if the guy had hacked into the low-level
software I/O routines, the system sockets? If so, he could be accessing bank files right now, writing to
them, wiping them clean of money.

Judy stared at the monster machine: six parallel processors, all cranking with more than 400 megabytes
of memory and tons of terabyte disk muscle, The latest crypto chips. All known Internet browser hacks
plugged. From the Net, there was no way into Laguna accounts.

"He's doing something new, Jose. ControlFreak's clean at this bank. Remember, I'm the one who
plugged all the holes. This hacker's cracked into the system using some method we've never seen