Well .. ok there is more to the story. but in a short summary:
some guy was trying to prove that a certain provider is engaging in shady spammer activities. he tries some portscans, connects to their mail servers and other things.
later he discovers that their nameserver does not prevent zone transfers. so he executes the host -l command which asks the DNS for a domain transfer - and he does get it. all the hosts inside their network that are registered at it. he publishes this information at the usenet, since it supports his claim about them being spammers.
and now comes the court.
his crime:
quite a "hack" - if you ask the lady at the entrance in a big companies office for a list of all their rooms and whatever, and she happily hands it out to you although it's only meant for higher executives - you are doing something illegal.
or more in tech terms: their stupid admin did enable zonetransfers for not authorized user (which is disabled per default afaik), and now claims that the anti-spam guy hacked their servers since he used "commands not known to the average user" and microsoft said that "host -l" is only for admins. well apparently you didn't need to be an admin to perform that command ..
full article here:
http://www.spamsuite.com/node/351
some guy was trying to prove that a certain provider is engaging in shady spammer activities. he tries some portscans, connects to their mail servers and other things.
later he discovers that their nameserver does not prevent zone transfers. so he executes the host -l command which asks the DNS for a domain transfer - and he does get it. all the hosts inside their network that are registered at it. he publishes this information at the usenet, since it supports his claim about them being spammers.
and now comes the court.
his crime:
The afore-mentioned commands are not commonly known to the average computer user.[..]
Ritz frequently accomplished his access to Sierra's computers by concealing his identity via proxies and by accessing the servers via a Unix operating system and using a shell accounts, among other methods. He also disguised himself as a mail server.
[..]
In those instances, however, the person conducting the diagnosis acts with the authorization of the operator of the system and is usually the network administrator for the system.[..]
The literature available on the subject all refers to access attempts such as the host -l command issued by Ritz under the circumstances of this case as "unauthorized." Microsoft itself, as well as various other, authorities all refer to zone transfers conducted by an individual other than the network administrator or an authoritative name server as "unauthorized."
quite a "hack" - if you ask the lady at the entrance in a big companies office for a list of all their rooms and whatever, and she happily hands it out to you although it's only meant for higher executives - you are doing something illegal.
or more in tech terms: their stupid admin did enable zonetransfers for not authorized user (which is disabled per default afaik), and now claims that the anti-spam guy hacked their servers since he used "commands not known to the average user" and microsoft said that "host -l" is only for admins. well apparently you didn't need to be an admin to perform that command ..
full article here:
http://www.spamsuite.com/node/351


















