亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 017.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                       *** A List Of Some OF The Most Useful UNIX **
     *** Hacking Commands, and Some Hints On Their Usage ***
       
---------------------------------------------------------------

     It is fun and often usefull to create a file that is owned 
by someone else.  On most systems with slack security ie 99% of 
all UNIX systems, this is quite easily done.  The chown command 
will change any of your files to make someone else the owner. 
Format is as follows:

chown ownername filelist

 Where ownername is the new owner, and filelist is the list of 
files to change.  You must own the file which your are goin to 
change, unless you are a superuser....then u can change ANYTHING!
     chgrp is a similar command which will change the group 
ownership on a file.  If you are going to do both a chown and a 
chgrp on a file, then make sure you do the chgrp first!  Once the 
file is owned by someone else, you cant change nything about it!

---------------------------------------------------------------

     Sometimes just seeing who is on the system is a challenge in 
itself.  The best way is to write your own version of who in C, 
but if you can't do that then this may be of some help to you:

     who   followed by on or more of the following flags:

          -b Displays time sys as last booted.
          -H Precedes output with header.
          -l Lists lines waiting for users to logon.
          -q displays number of users logged on.
          -t displays time sys clock was last changed.
          -T displays the state field (a + indicates it is 
possible to send to terminal, a - means u cannot)
          -u Give a complete listing of those logged on.

   **who -HTu is about the best choice for the average user**

##by the way, the list of users logged on is kept in the file 
/etc/utmp.  If you want to write your own personalised version of 
who in C, you now know where to look!###

--------------------------------------------------------------- 

     When a users state field (see -T flag option for who 
command) says that a user has their message function on, this 
actually means that it is possible to get stuff onto their 
screen.
     Basically, every terminal on the system has a file 
corresponding to it.  These files can be found in the /dev 
directory.  You can to anything to these files, so long as you 
have access -eg you can read them, and write to them, but you 
will notice that they never change in size.  They are called 
character specific files, and are really the link between the 
system and the terminals.  Whatever you put in these files will 
go staright to the terminal it corresponds to.
     Unfortunately, on most systems, when the user logs in, the 
"mesg n" command is issued which turns off write access to that 
terminal, BUT- if you can start cating to that terminal before 
system issues the mesg n command, then you will continue to be 
able to get stuff up on that terminal! This has many varied uses.

     Check out the terminal, or terminal software being used.  
Often you will be able to remotely program another users 
terminal, simply by 'cating' a string to a users screen.  You 
might be able to set up a buffer, capturing all that is typed, or 
you may be able to send the terminal into a frenzy- (sometimes a 
user will walk away without realizing that they are sill 
effectively logged on, leaving you with access to their 
account!).  Some terminal types also have this great command 
called transmit screen. It transmits everything on the screen, 
just as if the user had typed it !
     So just say I wanted to log off a user, then I would send a 
clear screen command (usually ctrl l), followed by "exit" 
followed by a carriage return, followed by the transmit screen 
code.  Using ths technique you can wipe peoples directories or 
anything.  My favourite is to set open access on all their files 
and directories so I can peruse them for deletion etc at my own 
leisure).            

---------------------------------------------------------------

     If you ever briefly get access to another persons account 
eg. they leave the room to go to toilet or whatever, then simply 
type the following:

chmod 777 $HOME
chmod 777 $MAIL

     Then clear the screen so they dont see what you just typed.

     Now you can go look at their directory, and their mail, and 
you can even put mail in their mail file. (just use the same 
format as any mail that is already there!). Next time they log in 
the system will automatically inform them they have new mail!

---------------------------------------------------------------

     Another way to send fake mail to people is to use the mail 
server.  This method produces mail that is slightly different to 
normal, so anyone who uses UNIX a bit may be suspiscious when 
they receive it, but it will fool the average  user!

type telnet

the following prompt will appear:

telnet>

now type :

open localhost 25

some crap will come up about the mail server..now type:

mail from: xxxxxx     Put any name you want.

some more bullshit will come up. Now type:

rcpt to: xxxxxx  Put the name of the person to receive mail here.

now type:

data

now you can type the letter...end it with a "."
type quit to exit once you are done.

-------------------------------------------------------------

     Heres one for any experimenters out there...
It is possible to create files which simply cannot be deleted 
from the standard shell.  To do this you will have to physically 
CREATE THE FILE USING A C PROGRAM or SCRIPT FILE, and you will 
have to use a sequence of control characters which cannot be 
typed from the shell.  Try things like Ctrl-h (this is the 
code for the delete key).  Just a file with the name Ctrl-h would 
not be deleteable from the shell, unless you used wildcards. So, 
make it a nice long series of characters, so that to delete the 
file, the user has no choice but to individually copy all his 
files elsewhere, then delete everything in his directory, and 
then copy all his files back.....this is one of my 
favourites..gets em every time!
     
     The following script file is an example which will create a 
file with the name Ctrl-h.  You MUST tyoe this file in using the 
vi editor or similar.
*****If you are not very good with vi, type "man vi" and print the 
help file...it even contains stuff that I find useful now and 
then.*****

type the following in vi...

echo'' > 'a^h'

  ***NOTE...to get the ^h (this really means ctrl-h) from vi type:

Ctrl v
Ctrl h 

  The Ctrl v instrcts vi to take the next character as a ascii 
character, and not to interpret it.
     change the access on the file you just created and now 
execute it.  It will create a file which looks like it is called 
a, but try to delete it !..use wildcards if you really want to 
delete it. 

*> Title:   Tutorial on hacking through a UNIX system


** 
 
In the following file, all references made to the name Unix, may also be 
substituted to the Xenix operating system. 
 
Brief history:  Back in the early sixties, during the development of 
third generation computers at MIT, a group of programmers studying the 
potential of computers, discovered their ability of performing two or 
more tasks simultaneously.  Bell Labs, taking notice of this discovery, 
provided funds for their developmental scientists to investigate into this 
new frontier.  After about 2 years of developmental research, they produced 
an operating system they called "Unix".  
Sixties to Current:  During this time Bell Systems installed the Unix system 
to provide their computer operators with the ability to multitask so that 
they could become more productive, and efficient.  One of the systems they
put on the Unix system was called "Elmos". Through Elmos many tasks (i.e.
billing,and installation records) could be done by many people using the same 
mainframe. 
 
Note: Cosmos is accessed through the Elmos system. 
 
Current:  Today, with the development of micro computers, such multitasking 
can be achieved by a scaled down version of Unix (but just as 
powerful).  Microsoft,seeing this development, opted to develop their own 
Unix like system for the IBM line of PC/XT's.  Their result they called 
Xenix (pronounced zee-nicks).  Both Unix and Xenix can be easily installed 
on IBM PC's and offer the same function (just 2 different vendors). 
 
Note: Due to the many different versions of Unix (Berkley Unix, 
Bell System III, and System V the most popular) many commands 
following may/may not work. I have written them in System V routines. 
Unix/Xenix operating systems will be considered identical systems below. 
 
How to tell if/if not you are on a Unix system:  Unix systems are quite 
common systems across the country. Their security appears as such: 
 
Login;     (or login;) 
password: 
 
When hacking on a Unix system it is best to use lowercase because the Unix 
system commands are all done in lower- case. Login; is a 1-8 character field. It is 
usually the name (i.e. joe or fred) of the user, or initials (i.e. j.jones 
or f.wilson).  Hints for login names can be found trashing the location of 
the dial-up (use your CN/A to find where the computer is). Password: is a 1-8 character password assigned by the sysop or chosen by the user. 
   
   Common default logins 
   -------------------------- 
   login;       Password: 
   root         root,system,etc.. 
   sys          sys,system 
   daemon       daemon 
   uucp         uucp 
   tty          tty 
   test         test 
   unix         unix 
   bin          bin 
   adm          adm 
   who          who 
   learn        learn 
   uuhost       uuhost 
   nuucp        nuucp 
 
If you guess a login name and you are not asked for a password, and have 
accessed to the system, then you have what is known as a non-gifted account. 
If you guess a correct login and pass- word, then you have a user account. 
And, if you get the root p/w you have a "super-user" account. 
All Unix systems have the following installed to their system: 
root, sys, bin, daemon, uucp, adm Once you are in the system, you will 
get a prompt. Common prompts are: 
 
$ 
% 
# 
 
But can be just about anything the sysop or user wants it to be. 
 
Things to do when you are in: Some of the commands that you may want to 
try follow below: 
 
who is on  (shows who is currently logged on the system.) 
write name (name is the person you wish to chat with) 
To exit chat mode try ctrl-D. 
EOT=End of Transfer. 
ls -a      (list all files in current   directory.) 
du -a      (checks amount of memory  your files use;disk usage) 
cd\name    (name is the name of the sub-directory you choose) 
cd\        (brings your home directory  to current use) 
cat name   (name is a filename either  a program or documentation  your username has written) 
 Most Unix programs are written  in the C language or Pascal 
 since Unix is a programmers'  environment. One of the first things done on the 
system is print up or capture (in a buffer) the file containing all user names and accounts. This can be done by doing the following command: 
 
cat /etc/passwd 
 
If you are successful you will see a list of all accounts on the system.  It 
should look like this:  
root:hvnsdcf:0:0:root dir:/: joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe hal::1:2:Hal Smith:/bin:/bin/hal 
 
The "root" line tells the following info : 
login name=root 
hvnsdcf   = encrypted password 
0         = user group number 
0         = user number 
root dir  = name of user 
/         = root directory 
 
In the Joe login, the last part "/bin/joe " tells us which directory 
is his home directory (joe) is. In the "hal" example the login name is 
followed by 2 colons, that means that there is no password needed to get in 
using his name. 
 
Conclusion:  I hope that this file will help other novice Unix hackers 
obtain access to the Unix/Xenix systems that they may find.



		      On the Security of UNIX

		      =-=-=-=-=-=-=-=-=-=-=-=

Recently there has been much interest in the security aspects of operating

systems and software.At issue is the ability to prevent undesired disclosure of

information, destruction of information,and harm to the functioning of the

system.This paper discusses the degree of security which can be provided under

the system and offers a number of hints on how to improve security.The first

fact to face is that UNIX was not developed with security,in any realistic

sense,in mind;this fact alone guarantees a vast number of holes.(Actually the

same statement can be made with respect to most systems.)



The area of security in which is theoretically weakest is in protecting against

crashing or at least crippling the operation of the system.The problem here is

not mainly in uncritical acceptance of bad parameters to system calls (there

may be bugs in this area, but none are known)but rather in lack of checks for

excessive consumption of resources.



Most notably, there is no limit on the amount of disk storage used, either in

total space allocated or in the number of files or directories.Here is a

particularly ghastly shell sequence guaranteed to stop the system:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区视频免费观看| 国产精品一二三| 3751色影院一区二区三区| 午夜精品123| 91精品福利在线一区二区三区| 大白屁股一区二区视频| 中文字幕中文字幕在线一区| 91丨九色丨蝌蚪富婆spa| 亚洲一二三区在线观看| 欧美妇女性影城| 国产一区二区三区| 中文字幕一区二区三区av| 91福利在线看| 久久精品国产久精国产| 国产日韩影视精品| 日本道精品一区二区三区 | 国产精品 欧美精品| 中文字幕 久热精品 视频在线 | 视频一区二区中文字幕| 日韩欧美一区二区久久婷婷| 国产一区二区三区国产| 亚洲精品视频一区二区| 日韩午夜在线观看视频| 成人av午夜电影| 亚洲国产成人av网| 国产午夜精品一区二区三区四区 | 在线亚洲免费视频| 热久久国产精品| 中文字幕亚洲视频| 日韩一区二区不卡| 91一区二区三区在线观看| 免费在线观看一区| ...av二区三区久久精品| 91精品国产欧美一区二区18| 豆国产96在线|亚洲| 同产精品九九九| 国产精品美女一区二区| 欧美高清一级片在线| 成人黄动漫网站免费app| 日韩福利视频网| 亚洲三级在线免费| 久久久午夜精品理论片中文字幕| 色就色 综合激情| 激情小说欧美图片| 一区二区在线观看视频| 久久久欧美精品sm网站| 欧美精品亚洲二区| 色综合久久久久久久久久久| 久久电影网电视剧免费观看| 亚洲一级在线观看| 国产精品久久久久7777按摩| 精品国精品国产尤物美女| 欧美日韩一级片网站| 97久久久精品综合88久久| 国产久卡久卡久卡久卡视频精品| 亚洲成av人片在www色猫咪| 国产精品成人午夜| 国产目拍亚洲精品99久久精品| 91精品久久久久久蜜臀| 欧美亚洲禁片免费| 91视频在线看| 9l国产精品久久久久麻豆| 91.麻豆视频| 欧美亚洲一区二区在线观看| 97精品久久久午夜一区二区三区| 国产99久久久国产精品免费看| 美女网站色91| 日本不卡的三区四区五区| 亚洲va中文字幕| 亚洲国产日产av| 亚洲国产综合视频在线观看| 亚洲欧美日韩国产综合在线| 国产精品你懂的在线欣赏| 欧美国产综合色视频| 国产欧美日韩久久| 欧美经典三级视频一区二区三区| 国产亚洲综合av| 国产日本欧美一区二区| 精品国产乱码久久| 久久久久国产免费免费| 国产午夜精品理论片a级大结局| 久久一区二区三区四区| 久久久欧美精品sm网站| 国产日本欧洲亚洲| 中文字幕av资源一区| 1区2区3区精品视频| 亚洲视频一二三| 亚洲一区二区在线免费观看视频| 亚洲精品一二三| 午夜激情综合网| 蜜桃免费网站一区二区三区| 毛片一区二区三区| 黄色日韩三级电影| 不卡av在线免费观看| 欧美性生活大片视频| 91麻豆精品国产91久久久使用方法| 3d成人h动漫网站入口| 欧美r级在线观看| 国产精品无人区| 亚洲精品午夜久久久| 日韩中文欧美在线| 国产一区在线精品| 99精品在线免费| 欧美精品色一区二区三区| 欧美α欧美αv大片| 国产人伦精品一区二区| 亚洲男人的天堂av| 日韩不卡一二三区| 国产精品综合二区| 日本韩国欧美一区二区三区| 日韩一区二区三区av| 亚洲成av人片观看| 国产成人午夜视频| 欧美日韩综合不卡| 国产日韩视频一区二区三区| 亚洲资源中文字幕| 国产一本一道久久香蕉| 91视频一区二区三区| 日韩视频免费观看高清在线视频| 欧美激情中文字幕一区二区| 亚洲大型综合色站| 粉嫩av一区二区三区在线播放| 色噜噜狠狠成人网p站| 久久亚洲综合色一区二区三区| 亚洲欧美日韩在线播放| 精品一区二区三区的国产在线播放| 成人免费三级在线| 日韩一级二级三级精品视频| 欧美国产视频在线| 麻豆成人久久精品二区三区红| 粉嫩aⅴ一区二区三区四区五区 | 91精品国产免费| 国产精品国产自产拍高清av| 日本aⅴ亚洲精品中文乱码| 91网站在线观看视频| 久久美女艺术照精彩视频福利播放| 亚洲精品伦理在线| 国产传媒一区在线| 日韩一区二区三区免费观看| 一区二区欧美在线观看| 成人精品一区二区三区四区| 日韩精品一区二区在线观看| 亚洲在线免费播放| 99在线精品观看| 国产午夜三级一区二区三| 美女性感视频久久| 91麻豆精品国产91久久久久久 | 麻豆91在线播放| 欧美日韩成人综合在线一区二区| 欧美国产精品一区二区三区| 激情图区综合网| 欧美成人性福生活免费看| 五月婷婷激情综合| 欧美综合一区二区| 亚洲免费电影在线| 91亚洲国产成人精品一区二区三| 久久老女人爱爱| 国产一区视频网站| 久久色成人在线| 国精品**一区二区三区在线蜜桃| 日韩一区二区三区av| 日本vs亚洲vs韩国一区三区 | 欧美一级黄色录像| 日韩精品亚洲专区| 欧美日韩一区精品| 天天色 色综合| 欧美精品乱人伦久久久久久| 亚洲国产精品自拍| 精品视频在线免费观看| 五月天一区二区三区| 欧美高清视频不卡网| 蜜臀av性久久久久蜜臀av麻豆 | 久久久.com| 成人综合激情网| 亚洲欧洲精品一区二区三区不卡 | 色综合久久88色综合天天6| 国产精品美女久久久久久久久久久 | 中文字幕国产一区二区| 福利电影一区二区三区| 国产精品传媒入口麻豆| 97久久精品人人澡人人爽| 亚洲人妖av一区二区| 欧美中文字幕一区| 图片区小说区区亚洲影院| 日韩免费视频一区二区| 国产一区二区女| 中文字幕一区日韩精品欧美| 99精品国产99久久久久久白柏| 亚洲精品成人悠悠色影视| 欧美日韩一区二区三区在线| 日韩精品色哟哟| 久久久夜色精品亚洲| av激情综合网| 天堂av在线一区| 久久久久久夜精品精品免费| 国产黄色91视频| 亚洲成人黄色影院| 久久久一区二区| 色哟哟在线观看一区二区三区| 日韩精品免费视频人成|