- Sir Dystic
Josh Buchbinder,Richtel, Matt. " [http://www.nytimes.com/library/tech/98/08/cyber/articles/04hacker.html Hacker Group Says Program Can Exploit Microsoft Security Hole] ," "
New York Times "4 August 1998 . Retrieved24 April 2007 .] better known as Sir Dystic, has been a member of CULT OF THE DEAD COW (cDc) since May1997 , [cDc communications. " [http://www.cultdeadcow.com/cms/team_bios.php3 CULT OF THE DEAD COW Team Bio] ." Retrieved18 May 2006 .] and is the author ofBack Orifice .cDc communications. " [http://www.cultdeadcow.com/news/back_orifice.txt Back Orifice Press Release] ." CULT OF THE DEAD COW Press Release,21 July 1998 . Retrieved18 May 2006 .] He has also written several other hacker tools, includingSMBRelay , NetE, andNBName .cDc communications. " [http://www.cultdeadcow.com/cms/apps.php3 CULT OF THE DEAD COW Killa Apps] ." Retrieved18 May 2006 .] Sir Dystic has appeared at multiplehacker con ventions, both as a member of panels and speaking on his own. He has also been interviewed on several television and radio programs [" [http://open.bbc.co.uk/catalogue/infax/programme/ANCE675A Cyber Attack] ." "Panorama",3 July 2000 . Retrieved18 May 2006 .] [" [http://open.bbc.co.uk/catalogue/infax/programme/YC+99252_1 Interview with Sir Dystic] ." "Today programme ",13 April 2000 ] and in an award-winning short film abouthacker culture in general and cDc in particular.Oakes, Chris. " [http://www.wired.com/news/business/1,34314-0.html Hack-umentary, the E-Film] ." "Wired News ",14 February 2000 . Retrieved18 May 2006 .]Dystic's pseudonym is taken from a somewhat obscure 1930s bondage comic character named "Sir Dystic D'Arcy." According to the cDc's Sir Dystic, his
namesake "tried to do evil things but always bungles it and ends up doing good inadvertently."Hack-umentary] [Rowe, William. " [http://feed.proteinos.com/item/820 Big 10 Hackers Going Legit] ."14 April 2000 . Retrieved18 May 2006 .]oftware
Back Orifice
Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. The program debuted at
DEF CON 6 onAugust 1 ,1998 . It was the brainchild of Sir Dystic, a member of the U.S. hacker organizationCULT OF THE DEAD COW . According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.According to Sir Dystic, "BO was supposed to be a statement about the fact that people feel secure and safe, although there are wide, gaping holes in both the operating system they're using and the means of defense they're using against hostile code. I mean, that was my message and BO2K really has a different message." [Starke, Thom. " [http://www.starkrealities.com/sirdystic.html An Interview with Sir Dystic] ."
15 July 1999 . Retrieved18 May 2006 .]Vnunet.com reported Sir Dystic's claim that this message was privately commended by employees of Microsoft. [Pennington, Sylvia. " [http://www.vnunet.com/vnunet/news/2109539/hackers-hold-key-computer-security-conference-told Hackers hold key to computer security, conference told] ."vnunet.com ,4 November 1999 . Retrieved18 May 2006 .]MBRelay & SMBRelay2
SMBRelay and SMBRelay2 are
computer program s that can be used to carry out SMB man in the middle (mitm) attacks on Windows machines. They were written by Sir Dystic and released21 March ,2001 at the @lantacon convention in Atlanta, Georgia.Greene, Thomas C. " [http://www.theregister.co.uk/2001/04/19/exploit_devastates_winnt_2k_security/Exploit devastates WinNT/2K security] ." "The Register " online edition,19 April 2001 . Retrieved18 May 2006 .]In an interview with "
The Register ", Sir Dystic explained his reasons for writing the programs as a response toMicrosoft wanting "their products to have as muchbackward compatibility as possible; but by continuing to use protocols that have known issues, they continue to leave their customers at risk to exploitation."NBName
NBName is a
computer program that can be used to carry outdenial-of-service attack s that can disableNetBIOS services on Windows machines. It was written by Sir Dystic and released29 July 2000 at theDEF CON 8 convention in Las Vegas.Harrison, Ann. " [http://www.computerworld.com/securitytopics/security/story/0,10801,47868,00.html Warnings about security holes abound at Def Con] ." "Computer World " online edition,1 August 2000 . Retrieved18 May 2006 .] Sir Dystic reported the issue that NBName exploits to Microsoft; he was acknowledged in a security bulletin. [" [http://www.microsoft.com/technet/security/bulletin/MS00-047.mspx Patch Available for 'NetBIOS Name Server Protocol Spoofing' Vulnerability] ." Microsoft Security Bulletin (MS00-047),27 July 2000 . Retrieved18 May 2006 .]External links
*
References
Wikimedia Foundation. 2010.