后门后门是黑客或超链者能够重复访问节点的一种手段,这比每次访问都要骇入更省力;这意味着它通常对网站管理员来说是隐藏的,尽管在重复使用合法账户的情况下,这可能意味着黑客是隐藏在显而易见的地方。一些黑客在离开某个他们会回来的节点之前,会花时间编码一个帐户或漏洞,这允许他们再次访问该节点。一般来说,后门有四种类型:可重用漏洞、合法账户、隐藏账户和隐藏访问点。
可重用漏洞正如在探查目标(第221页,SR4页)中所指出的,如果黑客没有做什么事情来暴露它们,或者它们没有被发现的话,一些被探查到的漏洞可以被反复使用。这种“开放式”后门的缺点是每次使用时系统都会进行一个分析+防火墙检定。
已经骇入节点的黑客也可以创建自己的可重用漏洞;一个在节点防火墙中精心设计的漏洞,可以让那些知道它的人极其容易地骇入节点。如果你在节点上至少有安保级别的访问权,那么创建可重用漏洞需要在软件+利用漏洞(防火墙+系统,主动性流程)延续检定中获得成功——否则就需要用骇入技能替换软件技能进行检定。一旦成功创建,这就提供了一个隐藏漏洞,给黑客+6DP修正来使用利用漏洞程序访问该节点。
像这样的一个已知漏洞的细节也可以被交易/出售给其他黑客,他们也将获得+6DP修正,直到该漏洞被发现并移除(参见检测后门,下文)
合法帐户节点期望获得来自正常用户的一定数量的流量,并且对于许多与工作相关的节点,甚至一些从家庭或私有终端的非工作时间访问也是典型的或符合预期的。如果黑客窃取了合法账户的密码,只要足够小心谨慎,他就可以继续使用该账户一段时间,直到蜘蛛发现任何状况(如果他们会发现的话)。
骇入节点的黑客也可以在系统上创建一个“合法”帐户(参见黑客与编辑,第225页,SR4),然后隐藏他们创建了这个帐户的事实。如果你至少有节点上的安保级别的访问权,这需要一个成功的软件+编辑检定,或如果你没有权限的话,骇入+编辑(2)检定。对于安保级别的访问权,将阈值增加到3;对于管理员级别的访问权,将其增加到4。新账户当然会出现在安保检查中,并且通常会仔细审查其合法性。该帐户的所有操作都被记录在案——它不是隐藏的,因为它是用合法帐户的外观创建的。一个公司系统上的可验证账户,加上一个假SIN和/或该黑客受雇于该公司的记录,可以为渗透提供一个非常有说服力的掩饰故事。
劇透 - :
LEGITIMATE ACCOUNTS
Nodes expect a certain amount of traffic from normal users, and for many work-related nodes even some off-hours access from home or private terminals is typical or expected. A hacker who steals the passcode to a legitimate account can, with care, continue to make use of that account for some time before a spider notices anything, if they ever do.
A hacker who has hacked the node may also create a "legit" account on the system (see Hackers & Editing, p. 225, SR4) and then hide the fact that they created it. This requires a successful Software + Editing Test if you have at least security privileges on the node, or a Hacking + Edit (2) Test if you do not. For securitylevel access, increase the threshold to 3; for admin access, increase it to 4. New accounts of course show up on security audits and are usually carefully scrutinized for legitimacy. All of the account’s actions are also logged—it’s not hidden, as it was created with the façade of a legitimate account. A verifiable account on a corporate system combined with a fake SIN and/or records that the hacker is employed by that corporation can make a very convincing cover story for an infiltration.
隐藏帐户隐藏帐户对蜘蛛或管理员是不可见的,只能被系统识别到。虽然这个账户允许黑客自由访问该节点,但它仍然受到账户权限限制,蜘蛛会认为他们是在非法入侵,因为他们看起来没有账户。
要创建一个隐藏帐户,你必须已经能够访问该节点(合法的或骇入的),并且必须遵循上面提到的创建合法帐户的步骤。在接下来的行动中,合法帐户必须通过进行一个骇入+隐匿(防火墙,10分钟)延续检定来隐藏。和其他账户一样,这个隐藏账户有一个独特密码;拥有这个密码的人都可以访问该账户。以前存在的合法帐户也可以通过这种方式转换为隐藏帐户,但访问日志必须被修改,否则安保检查将显示帐户神秘地消失了。
隐藏访问点隐藏访问点类似于可重用漏洞,只是黑客利用了某个软件缺陷,允许他在没有实际授予他账户的情况下访问某个节点。要创建一个隐藏访问点,黑客必须先访问该系统,并必须进行骇入+利用漏洞(防火墙+系统,1分钟)的延续检定。
这样做的好处是,这种隐藏访问点使渗透系统变得非常容易,只需要一个骇入+利用漏洞(1)简单检定,而防火墙不会进行检测入侵者的检定。由于没有账户被使用,只要黑客没有被巡逻IC的雷达抓到,访问就不会被发现。
然而,因为没有获得密码,黑客没有账户权限,只要他以这种方式连接到节点,黑客就必须依靠骇入技能进行所有检定(常见的做法是,通过隐藏访问点访问系统,然后创建一个账户,离开系统,然后用假账户“合法”登录)。察觉到黑客的IC或安保黑客会立即识别他为入侵者。
请注意,使用隐藏访问点的黑客的操作仍然记录在访问日志中,但它们由于没有和账户挂钩而被掩盖和混淆了。然而,黑客的数据踪迹仍可能被追踪。
劇透 - :
HIDDEN ACCESS POINTS
A hidden access point is similar to a reusable exploit, except the hacker exploits a software flaw that allows him access to a node without actually granting him an account. To create a hidden access point, the hacker must have previous access to the system and must make a Hacking + Exploit (Firewall + System, 1 minute) Extended Test.
The advantage is that such hidden access points make it very easy to penetrate the system, requiring only a simple Hacking + Exploit (1) Test, and the Firewall gets no test to detect the intruder. As no account is being used, access won’t be noticed as long as the intruding hacker remains under the radar of patrolling IC.
Since no passcodes have been obtained, however, the hacker has no account privileges at all and must rely on Hacking for all tests as long as he is connected to the node in this manner (it is common practice to access the system via the hidden access point and then create an account, leave the system, and do a "legal" log on with the fake account). IC or security hackers that perceive the hacker will immediately recognize him as an intruder.
Note that the actions of a hacker who uses a hidden access point are still recorded in the access log, but they are obscured and confusing because they are not tied to an account. The hacker’s datatrail may still be tracked, however.
检测后门具有安保或管理员权限的用户可以进行帐户检查和安保扫描,以寻找已知或可疑的后门。当然,拥有节点的安保或管理员访问权的黑客可以自行进行搜索,利用他们同伴的辛勤工作,并将结果留给自己。一些超链者黑客已经知道在他们的后门上打上水印(见第237页,SR4),以便其他超链者黑客或网精找到它们。
可重用漏洞和骇入账户:执行例行检查的蜘蛛或黑客将在成功的数据搜索+浏览(黑客使用的利用漏洞程序或账户的最低等级,1天)延续检定中发现可重用漏洞或非法使用的合法账户;通过成功的软件+编辑(防火墙,1分钟)延续检定,可以立即修复该漏洞,而合法帐户通常被锁定,等待官方审查。如果日志显示合法帐号没有从事任何非法或可疑的活动,该帐号将被解锁;否则,用户将面临逮捕和/或审问。受到这种审查的黑客创建的账户通常会被删除,除非黑客有一个很好的故事做掩饰,并一直小心翼翼地通过编辑日志来隐藏她的活动。
隐藏账户和隐藏访问点:隐藏账户和隐藏访问点不出现在安保权限和管理员权限的常规检查中, 但如果蜘蛛意识到它们(通过草率的日志编辑或看到黑客使用它们),一场彻底的帐户检查——数据搜索+浏览(黑客使用的隐藏访问点或隐藏帐户的最低等级 x 2, 1天)的延续检定将揭示它们,在这之后它们可能被编辑或正常删除。
探查目标:在GM的判断下,正在探查目标(第221页,SR4)的黑客会发现一个后门,而不是可利用的漏洞。
劇透 - :
DETECTING BACKDOORS
Users with security or admin privileges can conduct account audits and security sweeps to look for known or suspected backdoors. Of course, hackers with security or admin access to a node can conduct their own searches and keep the results to themselves, making use of the hard work of their fellow hackers. Some technomancer hackers have been known to watermark their backdoors (see p. 237, SR4), so that other technomancer or sprite hackers can find them.
Reusable Exploits and Hacked Accounts: A spider or hacker conducting a routine audit will detect a reusable exploit or unauthorized use of a legitimate account on a successful Extended Data Search + Browse (lowest Stealth rating of hacker using exploit or account, 1 day) Test; the exploit may be immediately fixed with a successful Extended Software + Edit (Firewall, 1 minute) Test, while the legitimate account is typically locked pending an official review. If the logs show the legitimate account has not been engaging in any illegal or questionable activity, the account will be unlocked; otherwise the user will face arrest and/or questioning. Hacker-created accounts subject to this review are typically deleted unless the hacker has taken care to have a good cover story and has been editing the logs to hide her activities.
Hidden Accounts and Access Points: Hidden accounts and access points do not show up on routine inspections by securitylevel and admin users, but if a spider becomes aware of them (either through a sloppy log edit or seeing the hacker use them), a thorough account audit—a successful Extended Data Search + Browse (lowest Stealth Rating of hacker using access point or account x 2, 1 day) Test—will reveal them, after which they may be edited or erased as normal.
Probing the Target: At the gamemaster’s discretion, a hacker who is probing the target (p. 221, SR4) may discover a backdoor rather than a flaw to exploit.