So, a class I'm subbing today is watching a "Hacker" documentary

Jschmuck2

Diamond Member
Jul 13, 2005
5,623
3
81
This History Channel documentary is talking about "hackers" "hacking" into subway and underground computer systems and taking them over - controlling trains, train signals and causing general havoc.

Aren't these things on a closed network? Why in the world would there be outside access into these things?

Please explain this to me, slowly, as if to a child.
 

lozina

Lifer
Sep 10, 2001
11,711
8
81
no hacker here, but I am guessing they are indeed on a closed network and the hackers have to actually go to the subway terminal or tunnels to tap into the network physically before they can attempt to hack into the system *shrug*
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Sure they're on a closed network, you just have to get a host on that network. There's a master control room for any of those services with many different machines running it all. Just get access to that and you can do whatever you want.
 

xchangx

Golden Member
Mar 23, 2000
1,692
1
71
Or you can just get alligator clips and attach them to outside of cat5 cables and steal their video signals like in other movies.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: xchangx
Or you can just get alligator clips and attach them to outside of cat5 cables and steal their video signals like in other movies.

You may laugh, but you can do that. Or just strip down to the copper and clip there.

You can even do the same with fiber optic cable.
 

MixMasterTang

Diamond Member
Jul 23, 2001
3,167
176
106
A lot of different equipment/networks may have a dial in number for remote support or often times they use a terminal emulation software package from a normal PC to access the equipment, but that PC may also have access to the internet. I have heard at some government agencies you have two PC's on your desk, one for accessing the network and a 2nd for anything that involves internet access (including email) to prevent this sort of vulnerability.
 

ViviTheMage

Lifer
Dec 12, 2002
36,189
87
91
madgenius.com
Originally posted by: spidey07
Originally posted by: xchangx
Or you can just get alligator clips and attach them to outside of cat5 cables and steal their video signals like in other movies.

You may laugh, but you can do that. Or just strip down to the copper and clip there.

You can even do the same with fiber optic cable.

blinding!

Originally posted by: MixMasterTang
A lot of different equipment/networks may have a dial in number for remote support or often times they use a terminal emulation software package from a normal PC to access the equipment, but that PC may also have access to the internet. I have heard at some government agencies you have two PC's on your desk, one for accessing the network and a 2nd for anything that involves internet access (including email) to prevent this sort of vulnerability.


did an IT job at a law firm, and this is true for some of the higher up lawyers there. They had 2 systems, one with windows, another separate for linux (assuming it was for there local database).