Josh Buchbinder,
[Richtel, Matt.]
" ''New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' 4 August 1998. Retrieved 24 April 2007.
better known as Sir Dystic, has been a member of
Cult of the Dead Cow (cDc) since May 1997,
and is the author of
Back Orifice.
[cDc communications.]
Back Orifice Press Release
" CULT OF THE DEAD COW Press Release, 21 July 1998. Retrieved 18 May 2006.
He has also written several other
hacker tools, including
SMBRelay, NetE, and
NBName.
[cDc communications.]
CULT OF THE DEAD COW Killa Apps
" Retrieved 18 May 2006.
Sir Dystic has appeared at multiple
hacker conventions, both as a member of panels and speaking on his own. He has also been interviewed on several television and radio programs
and in an award-winning short film about
hacker culture
The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), ...
in general and cDc in particular.
[Oakes, Chris.]
Hack-umentary, the E-Film
" '' Wired News'', 14 February 2000. Retrieved 18 May 2006.
Dystic's pseudonym is taken from a somewhat obscure 1930s bondage comic character named "Sir Dystic D'Arcy." According to the cDc's Sir Dystic, his
namesake "tried to do evil things but always bungles it and ends up doing good inadvertently."
Software
Back Orifice
Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. The program debuted at
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
6 on August 1, 1998. It was the brainchild of Sir Dystic, a member of the U.S. hacker organization
Cult of the Dead Cow. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.
According to Sir Dystic, "BO was supposed to be a statement about the fact that people feel secure and safe, although there are wide, gaping holes in both the operating system they're using and the means of defense they're using against hostile code. I mean, that was my message and
BO2K really has a different message."
Vnunet.com reported Sir Dystic's claim that this message was privately commended by employees of Microsoft.
SMBRelay & SMBRelay2
SMBRelay and SMBRelay2 are
computer program
A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. It is one component of software, which also includes software documentation, documentation and other intangibl ...
s that can be used to carry out
SMB man in the middle (mitm) attacks on
Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
machines. They were written by Sir Dystic and released 21 March 2001 at the @lantacon convention in
Atlanta
Atlanta ( ) is the List of capitals in the United States, capital and List of municipalities in Georgia (U.S. state), most populous city in the U.S. state of Georgia (U.S. state), Georgia. It is the county seat, seat of Fulton County, Georg ...
,
Georgia
Georgia most commonly refers to:
* Georgia (country), a country in the South Caucasus
* Georgia (U.S. state), a state in the southeastern United States
Georgia may also refer to:
People and fictional characters
* Georgia (name), a list of pe ...
.
NBName
NBName is a
computer program
A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. It is one component of software, which also includes software documentation, documentation and other intangibl ...
that can be used to carry out
denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s that can disable
NetBIOS
NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, Net ...
services on
Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
machines. It was written by Sir Dystic and released 29 July 2000 at the
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
8 convention in
Las Vegas
Las Vegas, colloquially referred to as Vegas, is the most populous city in the U.S. state of Nevada and the county seat of Clark County. The Las Vegas Valley metropolitan area is the largest within the greater Mojave Desert, and second-l ...
.
[Harrison, Ann.]
Warnings about security holes abound at Def Con
" '' Computer World'' online edition, 1 August 2000. Retrieved 18 May 2006. Sir Dystic reported the issue that NBName exploits to Microsoft; he was acknowledged in a security bulletin.
[Patch Available for 'NetBIOS Name Server Protocol Spoofing' Vulnerability]
" Microsoft Security Bulletin (MS00-047), 27 July 2000. Retrieved 18 May 2006.
External links
*
References
{{DEFAULTSORT:Sir Dystic
Cult of the Dead Cow members
People associated with computer security
Living people
Computer programmers
Year of birth missing (living people)
Hackers
Hacker culture