- Dildog
:"Dildog is also the original name of
Dogbert ."DilDog is the handle that Christien Rioux [ [http://www.csoonline.com/read/040107/fea_lopht.html L0pht in Transition] , April, 2007. Retrieved
May 3 ,2007 .] used while at MIT and atL0pht Heavy Industries in the 1990s. [ [http://www.csoonline.com/read/040107/fea_lopht.html L0pht in Transition] April, 2007. RetrievedMay 3 ,2007 .] Rioux is now the co-founder and chief scientist of [http://www.veracode.com Veracode] . He is the main patent holder for Veracode, based in Burlington, Mass. [ [http://select.nytimes.com/gst/abstract.html?res=FB0812FD3D5A0C718EDDAD0894DF404482] ,April 22 ,2007 . RetrievedMay 11 ,2007 ] Rioux' worked at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec). While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA). [ [http://209.85.165.104/search?q=cache:_YhFZ1xHUI0J:findarticles.com/p/articles/mi_zdewk/is_200405/ai_ziff128126+SmartRisk+Analyzer+SRA+%40stake&hl=en&ct=clnk&cd=4&gl=us] , May, 2004. RetrievedMay 24 ,2007 ] He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. [ [http://www.veracode.com/blog/?page_id=3] ,December 21 ,2006 . RetrievedMay 24 ,2007 ]He [http://www.cultdeadcow.com/cms/team_bios.php3 is also a member] of
Cult of the Dead Cow Messmer, Ellen, " [http://www.cnn.com/TECH/computing/9907/21/badrap.idg/ Bad Rap for Back Orifice 2000?] ,"CNN Online,July 21 ,1999 . RetrievedApril 17 ,2007 .] and its Ninja Strike Force. Formerly, he was a member ofL0pht [Bauer, Mick, " [http://www.linuxjournal.com/article/6126 Q&A with Chris Wysopal (Weld Pond)] ," "Linux Journal",September 1 ,2002 . RetrievedApril 17 ,2007 .] [ [http://attrition.org/errata/www/ao.016.html Security Scene Errata] ] and subsequent employee of@stake andSymantec , where he was responsible for many security advisories [Dildog, " [http://www.textfiles.com/hacking/MICROSOFT/lopht.txt L0pht Security Advisory: Microsoft Windows NT 4.0] ,"February 18 ,1999 . RetrievedApril 19 ,2007 .] [Dildog, " [http://www.security-express.com/archives/bugtraq/2000-01/0112.html L0pht Security Advisory: LPD, RH 4.x,5.x,6.x] ,"January 8 ,2000 . RetrievedApril 19 ,2007 .]DilDog is best known as the author of the original code for
Back Orifice 2000 Bad Rap for Back Orifice 2000] [Messmer, Ellen, " [http://www.networkworld.com/newsletters/sec/0712sec2.html Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit] ,"Network World , July 14, 1999. RetrievedApril 17 ,2007 .] [cDc communications. " [http://www.bo2k.com/docs/bo2k_pressrelease.html Back Orifice 2000 Press Release] ." CULT OF THE DEAD COW Press Release,July 10 ,1999 . RetrievedApril 17 ,2007 .] , an open sourceremote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow." [Dildog, " [http://www.cultdeadcow.com/cDc_files/cDc-351/ The Tao of Windows Buffer Overflow] ," "CULT OF THE DEAD COW" issue #351,May 1 ,1998 . RetrievedApril 17 ,2007 .] [Park, Yong-Joon and Gyungho Lee, " [http://portal.acm.org/citation.cfm?id=977139 Repairing return address stack for buffer overflow protection] ," "Proceedings of the 1st conference on Computing frontiers", ACM, 2004. RetrievedApril 17 ,2007 .]Projects
Back Orifice 2000
Back Orifice 2000 (often shortened to BO2k) is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.
According to Dildog, the software's main author, the freeware lets a remote user with the Back Orifice 2000 client secretly control any Windows desktop or server on which the Back Orifice 2000 server component has been installed.Messmer, Ellen, " [http://www.cnn.com/TECH/computing/9907/21/badrap.idg/ Bad Rap for Back Orifice 2000?] ,"
CNN Online,July 21 ,1999 . RetrievedApril 17 ,2007 .]BUTTSniffer
BUTTSniffer is a packet sniffer and network monitor for Win95, Win98 and also Windows NT 4.0. It works as a standalone executable, and as plugin for Back Orifice. [ [http://packetstormsecurity.nl/sniffers/buttsniffer/ Packet Storm] ]
It features the following:
* TCP Connection monitoring. Full and split screen. Text and Hexadecimal views.
* Password sniffing. Full phrasecatcher built in. Currently supports HTTP basic authentication, FTP, Telnet, POP2 and POP3. Support pending for IMAP2, RLogin, and possibly other protocols
* Packet filtering. Firewall style filtering lists. Exclude/include ranges of IP addresses and ports.
* Multiple interface support. Can be started on any of the system's network interfaces. Multiple instances of BUTTSniffer can be run at the same time.
* Interactive mode. Spawns a port that you can telnet to, and displays an easy to use vt100 menu based user interface for remote sniffer access.
* War mode. War mode features include connection resetting.
* Win95, Win98, and Windows NT operating system support.References
Wikimedia Foundation. 2010.