Sir Dystic
Josh Buchbinder,[1] better known as Sir Dystic, has been a member of Cult of the Dead Cow (cDc) since May 1997,[2] and is the author of Back Orifice.[1][3] He has also written several other hacker tools, including SMBRelay, NetE, and NBName.[4] Sir Dystic has appeared at multiple
Dystic's pseudonym is taken from a somewhat obscure 1930s bondage comic character named "Sir Dystic D'Arcy." According to the cDc's Sir Dystic, his namesake "tried to do evil things but always bungles it and ends up doing good inadvertently."[6][7]
Software
Back Orifice
Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. The program debuted at DEF CON 6 on August 1, 1998. It was the brainchild of Sir Dystic, a member of the U.S. hacker organization Cult of the Dead Cow. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.[1][3]
According to Sir Dystic, "BO was supposed to be a statement about the fact that people feel secure and safe, although there are wide, gaping holes in both the operating system they're using and the means of defense they're using against hostile code. I mean, that was my message and
SMBRelay & SMBRelay2
SMBRelay and SMBRelay2 are
NBName
NBName is a
External links
- Sir Dystic at IMDb
References
- ^ New York Times4 August 1998. Retrieved 24 April 2007.
- ^ cDc communications. "CULT OF THE DEAD COW Team Bio." Retrieved 18 May 2006.
- ^ a b cDc communications. "Back Orifice Press Release." CULT OF THE DEAD COW Press Release, 21 July 1998. Retrieved 18 May 2006.
- ^ cDc communications. "CULT OF THE DEAD COW Killa Apps." Retrieved 18 May 2006.
- Panorama, 3 July 2000. Retrieved 18 May 2006.
- ^ Wired News, 14 February 2000. Retrieved 18 May 2006.
- ^ Rowe, William. "Big 10 Hackers Going Legit." 14 April 2000. Retrieved 18 May 2006.
- ^ Starke, Thom. "An Interview with Sir Dystic." 15 July 1999. Retrieved 18 May 2006.
- vnunet.com, 4 November 1999. Retrieved 18 May 2006.
- ^ Harrison, Ann. "Warnings about security holes abound at Def Con." Computer World online edition, 1 August 2000. Retrieved 18 May 2006.
- ^ "Patch Available for 'NetBIOS Name Server Protocol Spoofing' Vulnerability." Microsoft Security Bulletin (MS00-047), 27 July 2000. Retrieved 18 May 2006.